CVE-2013-2224
Publication date 4 July 2013
Last updated 24 July 2024
Ubuntu priority
A certain Red Hat patch for the Linux kernel 2.6.32 on Red Hat Enterprise Linux (RHEL) 6 allows local users to cause a denial of service (invalid free operation and system crash) or possibly gain privileges via a sendmsg system call with the IP_RETOPTS option, as demonstrated by hemlock.c. NOTE: this vulnerability exists because of an incorrect fix for CVE-2012-3552.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | ||
linux-armadaxp | ||
linux-ec2 | ||
linux-fsl-imx51 | ||
linux-linaro-omap | ||
linux-linaro-shared | ||
linux-linaro-vexpress | ||
linux-lts-backport-maverick | ||
linux-lts-quantal | ||
linux-lts-raring | ||
linux-mvl-dove | ||
linux-qcm-msm | ||
linux-ti-omap4 | ||
Notes
seth-arnold
Unprivileged user kernel crash demonstrated; code execution neither confirmed nor denied.
henrix
This is a Red Hat specific bug introduced by their CVE-2012-3552 fix. This was a backport of upstream f6d8bd051c391c1c0458a30b2a7abcd939329259. Only Lucid contains a backport of this commit (all the other Ubuntu kernels include the upstream commit) and Lucid backport is quite different from RH one (it was picked from upstream 3.2, which picked it from Debian).