First published: Fri Sep 13 2013(Updated: )
A flaw was found in the way ip packets with ihl of zero were processed in the skb_flow_dissect() function in the Linux kernel. A remote attacker could use this flaw to cause inifinite loop in the kernel. Acknowledgements: This issue was found by Jason Wang of Red Hat.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=3.2<3.2.54 | |
Linux Kernel | >=3.3<3.4.70 | |
Linux Kernel | >=3.5<3.10.20 | |
Linux Kernel | >=3.11<3.11.9 | |
Linux Kernel | >=3.12<3.12.1 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =13.10 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 | |
Ubuntu | =12.04 | |
Ubuntu | =13.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4348 is considered a medium severity vulnerability due to its potential to cause an infinite loop in the Linux kernel.
To fix CVE-2013-4348, update the Linux kernel to a version that is not affected, such as any version beyond the specified vulnerable ranges.
CVE-2013-4348 affects Linux kernel versions from 3.2 to 3.12.1, including specific versions of Ubuntu Linux 12.04 and 13.10.
Yes, CVE-2013-4348 can be exploited remotely, allowing an attacker to trigger denial of service conditions.
If your system is vulnerable to CVE-2013-4348, immediately upgrade to a fixed kernel version to mitigate the risk.