Hide Forgot
Linux kernel built with an Ethernet driver(ex virtio-net) which has UDP Fragmentation Offload(UFO) feature ON is vulnerable to a memory corruption flaw when UDP_CORK socket option is set. It could occur when sending large messages, wherein not all messages are greater than maximum transfer unit(MTU) of the underlying medium. An unprivileged user/program could use this flaw to crash the kernel resulting in DoS, or potentially escalate their privileges on the system. Upstream fix: ------------- -> http://patchwork.ozlabs.org/patch/285292/ -> https://git.kernel.org/linus/c547dbf55d5f8cf615ccc0e7265e98db27d3fb8b -> https://git.kernel.org/linus/e93b7d748be887cd7639b113ba7d7ef792a7efb9
Statement: This issue does not affect the version of the kernel package as shipped with Red Hat Enterprise Linux 5.
Acknowledgements: Red Hat would like to thank Hannes Frederic Sowa for reporting this issue.
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1023495]
kernel-3.11.6-201.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
kernel-3.11.7-300.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
kernel-3.11.7-100.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2013:1801 https://rhn.redhat.com/errata/RHSA-2013-1801.html
This issue has been addressed in following products: MRG for RHEL-6 v.2 Via RHSA-2014:0100 https://rhn.redhat.com/errata/RHSA-2014-0100.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6.4 EUS - Server and Compute Node Only Via RHSA-2014:0284 https://rhn.redhat.com/errata/RHSA-2014-0284.html