Bug 1141742 (CVE-2012-6657) - CVE-2012-6657 Kernel: net: guard tcp_set_keepalive against crash
Summary: CVE-2012-6657 Kernel: net: guard tcp_set_keepalive against crash
Alias: CVE-2012-6657
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1141744 1141746
Blocks: 1140494
TreeView+ depends on / blocked
Reported: 2014-09-15 11:28 UTC by Prasad Pandit
Modified: 2021-02-17 06:13 UTC (History)
28 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
It was found that the Linux kernel's networking implementation did not correctly handle the setting of the keepalive socket option on raw sockets. A local user able to create a raw socket could use this flaw to crash the system.
Clone Of:
Last Closed: 2015-08-22 06:15:17 UTC

Attachments (Terms of Use)

System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:1997 0 normal SHIPPED_LIVE Important: kernel security and bug fix update 2014-12-17 00:12:55 UTC

Description Prasad Pandit 2014-09-15 11:28:36 UTC
Linux kernel built with the Networking support(CONFIG_NET) is vulnerable to a
crash, while resetting a socket timer. It could occur while doing a
setsockopt(SO_KEEPALIVE) call.

A privileged user/process able to create RAW socket could use this flaw to
crash the system kernel resulting in DoS.

Upstream fix:
  -> https://git.kernel.org/linus/3e10986d1d698140747fcfc2761ec9cb64c1d582

Comment 1 Prasad Pandit 2014-09-15 11:31:15 UTC

This issue does not affect the versions of Linux kernel as shipped with
Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2.

This issue affects the version of the kernel package as shipped with
Red Hat Enterprise Linux 5 and 6. Future kernel updates for Red Hat Enterprise
Linux 5 and 6 may address this issue.

Comment 3 Murray McAllister 2014-09-16 02:58:52 UTC
MITRE assigned CVE-2012-6657 to this issue:


Comment 4 errata-xmlrpc 2014-12-16 19:14:47 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2014:1997 https://rhn.redhat.com/errata/RHSA-2014-1997.html

Note You need to log in before you can comment on or make changes to this bug.