Linux kernel built with IPv6 networking is vulnerable to a crash while sending data as a single datagram over IPv6 socket when UDP_CORK option set. UDP_CORK enables accumulating data and sending it as a single datagram. An unprivileged user/program could use this flaw to crash the kernel, resulting in local DoS. Upstream fix: ============= -> https://git.kernel.org/linus/8822b64a0fa64a5dd1dfcf837c5b0be83f8c05d1 Acknowledgements: Red Hat would like to thank Hannes Frederic Sowa for reporting this issue.
Statement: This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6 may address this issue.
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 987656]
This issue has been addressed in following products: MRG for RHEL-6 v.2 Via RHSA-2013:1264 https://rhn.redhat.com/errata/RHSA-2013-1264.html
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2013:1292 https://rhn.redhat.com/errata/RHSA-2013-1292.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2013:1436 https://rhn.redhat.com/errata/RHSA-2013-1436.html
This issue has been addressed in following products: OpenStack 3 for RHEL 6 Via RHSA-2013:1520 https://rhn.redhat.com/errata/RHSA-2013-1520.html