Linux kernels built with Datagram Congestion Control Protocol(DCCP), are vulnerable to a NULL pointer dereference flaw. This occurs while accessing socket options of dccp_sock objects via ccid_hc_rx_getsockopt & ccid_hc_tx_getsockopt routines. A user/program could use this flaw to crash the kernel, resulting in DoS. Upstream fix: ------------- -> https://git.kernel.org/linus/276bdb82dedb290511467a5a4fdbe9f0b52dce6f Reference: ---------- -> http://seclists.org/oss-sec/2013/q1/598
Statement: This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2. This issue affects the version of Linux kernel as shipped with Red Hat Enterprise Linux 6.
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2013:0744 https://rhn.redhat.com/errata/RHSA-2013-0744.html