First published: Wed Nov 13 2013(Updated: )
Commit 1e2bd517c108816220f262d7954b697af03b5f9c ("udp6: Fix udp fragmentation for tunnel traffic.") changed the calculation if there is enough space to include a fragment header in the skb from a skb->mac_header dervived one to skb_headroom. Because we already peeled off the skb to transport_header this is wrong. This fixes a panic Saran Neti reported. He used the tbf scheduler which skb_gso_segments the skb. The offsets get negative and we panic in memcpy because the skb was erroneously not expanded at the head. Introduced by: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1e2bd517c108816220f262d7954b697af03b5f9c">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1e2bd517c108816220f262d7954b697af03b5f9c</a> Introduced in: v3.10-rc5 Upstream fix: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0e033e0">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0e033e0</a> References: <a href="http://marc.info/?l=linux-netdev&m=138305762205012&w=2">http://marc.info/?l=linux-netdev&m=138305762205012&w=2</a> Acknowledgements: Red Hat would like to thank Saran Neti of TELUS Security Labs for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=3.9.8<=3.10.23 | |
Linux Kernel | >=3.11<3.12.4 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =13.10 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 | |
Ubuntu | =12.04 | |
Ubuntu | =13.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4563 has a medium severity level, affecting the fragmentation handling in the Linux kernel.
To fix CVE-2013-4563, update the Linux kernel to a version that includes the patches mentioned in the vulnerability report.
CVE-2013-4563 affects Linux Kernel versions between 3.9.8 and 3.10.23, as well as 3.11.x versions up to 3.12.4.
Yes, Ubuntu versions 12.04 and 13.10 are vulnerable to CVE-2013-4563.
Recommended kernel versions to mitigate CVE-2013-4563 include 5.10.223-1, 5.10.226-1, 6.1.119-1, 6.1.123-1, 6.12.10-1, and 6.12.11-1.