ID CVE-2013-2224
Summary A certain Red Hat patch for the Linux kernel 2.6.32 on Red Hat Enterprise Linux (RHEL) 6 allows local users to cause a denial of service (invalid free operation and system crash) or possibly gain privileges via a sendmsg system call with the IP_RETOPTS option, as demonstrated by hemlock.c. NOTE: this vulnerability exists because of an incorrect fix for CVE-2012-3552.
References
Vulnerable Configurations
  • cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
CVSS
Base: 6.9 (as of 22-04-2019 - 17:48)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:L/AC:M/Au:N/C:C/I:C/A:C
redhat via4
advisories
  • rhsa
    id RHSA-2013:1166
  • rhsa
    id RHSA-2013:1173
  • rhsa
    id RHSA-2013:1450
rpms
  • kernel-0:2.6.18-348.16.1.el5
  • kernel-PAE-0:2.6.18-348.16.1.el5
  • kernel-PAE-debuginfo-0:2.6.18-348.16.1.el5
  • kernel-PAE-devel-0:2.6.18-348.16.1.el5
  • kernel-debug-0:2.6.18-348.16.1.el5
  • kernel-debug-debuginfo-0:2.6.18-348.16.1.el5
  • kernel-debug-devel-0:2.6.18-348.16.1.el5
  • kernel-debuginfo-0:2.6.18-348.16.1.el5
  • kernel-debuginfo-common-0:2.6.18-348.16.1.el5
  • kernel-devel-0:2.6.18-348.16.1.el5
  • kernel-doc-0:2.6.18-348.16.1.el5
  • kernel-headers-0:2.6.18-348.16.1.el5
  • kernel-kdump-0:2.6.18-348.16.1.el5
  • kernel-kdump-debuginfo-0:2.6.18-348.16.1.el5
  • kernel-kdump-devel-0:2.6.18-348.16.1.el5
  • kernel-xen-0:2.6.18-348.16.1.el5
  • kernel-xen-debuginfo-0:2.6.18-348.16.1.el5
  • kernel-xen-devel-0:2.6.18-348.16.1.el5
  • kernel-0:2.6.32-358.18.1.el6
  • kernel-bootwrapper-0:2.6.32-358.18.1.el6
  • kernel-debug-0:2.6.32-358.18.1.el6
  • kernel-debug-debuginfo-0:2.6.32-358.18.1.el6
  • kernel-debug-devel-0:2.6.32-358.18.1.el6
  • kernel-debuginfo-0:2.6.32-358.18.1.el6
  • kernel-debuginfo-common-i686-0:2.6.32-358.18.1.el6
  • kernel-debuginfo-common-ppc64-0:2.6.32-358.18.1.el6
  • kernel-debuginfo-common-s390x-0:2.6.32-358.18.1.el6
  • kernel-debuginfo-common-x86_64-0:2.6.32-358.18.1.el6
  • kernel-devel-0:2.6.32-358.18.1.el6
  • kernel-doc-0:2.6.32-358.18.1.el6
  • kernel-firmware-0:2.6.32-358.18.1.el6
  • kernel-headers-0:2.6.32-358.18.1.el6
  • kernel-kdump-0:2.6.32-358.18.1.el6
  • kernel-kdump-debuginfo-0:2.6.32-358.18.1.el6
  • kernel-kdump-devel-0:2.6.32-358.18.1.el6
  • perf-0:2.6.32-358.18.1.el6
  • perf-debuginfo-0:2.6.32-358.18.1.el6
  • python-perf-0:2.6.32-358.18.1.el6
  • python-perf-debuginfo-0:2.6.32-358.18.1.el6
  • kernel-0:2.6.32-358.118.1.openstack.el6
  • kernel-debug-0:2.6.32-358.118.1.openstack.el6
  • kernel-debug-debuginfo-0:2.6.32-358.118.1.openstack.el6
  • kernel-debug-devel-0:2.6.32-358.118.1.openstack.el6
  • kernel-debuginfo-0:2.6.32-358.118.1.openstack.el6
  • kernel-debuginfo-common-x86_64-0:2.6.32-358.118.1.openstack.el6
  • kernel-devel-0:2.6.32-358.118.1.openstack.el6
  • kernel-doc-0:2.6.32-358.118.1.openstack.el6
  • kernel-firmware-0:2.6.32-358.118.1.openstack.el6
  • kernel-headers-0:2.6.32-358.118.1.openstack.el6
  • perf-0:2.6.32-358.118.1.openstack.el6
  • perf-debuginfo-0:2.6.32-358.118.1.openstack.el6
  • python-perf-0:2.6.32-358.118.1.openstack.el6
  • python-perf-debuginfo-0:2.6.32-358.118.1.openstack.el6
  • kernel-0:2.6.32-279.37.2.el6
  • kernel-bootwrapper-0:2.6.32-279.37.2.el6
  • kernel-debug-0:2.6.32-279.37.2.el6
  • kernel-debug-debuginfo-0:2.6.32-279.37.2.el6
  • kernel-debug-devel-0:2.6.32-279.37.2.el6
  • kernel-debuginfo-0:2.6.32-279.37.2.el6
  • kernel-debuginfo-common-i686-0:2.6.32-279.37.2.el6
  • kernel-debuginfo-common-ppc64-0:2.6.32-279.37.2.el6
  • kernel-debuginfo-common-s390x-0:2.6.32-279.37.2.el6
  • kernel-debuginfo-common-x86_64-0:2.6.32-279.37.2.el6
  • kernel-devel-0:2.6.32-279.37.2.el6
  • kernel-doc-0:2.6.32-279.37.2.el6
  • kernel-firmware-0:2.6.32-279.37.2.el6
  • kernel-headers-0:2.6.32-279.37.2.el6
  • kernel-kdump-0:2.6.32-279.37.2.el6
  • kernel-kdump-debuginfo-0:2.6.32-279.37.2.el6
  • kernel-kdump-devel-0:2.6.32-279.37.2.el6
  • perf-0:2.6.32-279.37.2.el6
  • perf-debuginfo-0:2.6.32-279.37.2.el6
  • python-perf-0:2.6.32-279.37.2.el6
  • python-perf-debuginfo-0:2.6.32-279.37.2.el6
refmap via4
confirm https://bugzilla.redhat.com/show_bug.cgi?id=979936
mlist [oss-security] 20130630 Re: CVE request: Kernel 2.6.32+ IP_RETOPTS Buffer Poisoning DoS
Last major update 22-04-2019 - 17:48
Published 04-07-2013 - 21:55
Last modified 22-04-2019 - 17:48
Back to Top