First published: Mon Jul 01 2013(Updated: )
Linux kernel is found to be vulnerable to a denial of service and/or possible code execution flaw caused by invalid free while sending message with sendmsg(2) call with IP_RETOPTS socket option set. This option is set to pass unprocessed IP options along with timestamps to a user via IP_OPTIONS control message. An unprivileged user/program could use this flaw to crash the system resulting in DoS or possibly gain root privileges via arbitrary code execution. Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2013/06/30/1">http://www.openwall.com/lists/oss-security/2013/06/30/1</a> This issue was introduced via Red Hat Enterprise Linux specific patch for <a href="https://access.redhat.com/security/cve/CVE-2012-3552">CVE-2012-3552</a>.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | ||
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-979936 is considered high due to its potential to cause denial of service and code execution vulnerabilities.
The main consequences of the REDHAT-BUG-979936 vulnerability include the risk of denial of service and possible code execution on affected systems.
To fix REDHAT-BUG-979936, apply the latest kernel updates provided by Red Hat or your Linux distribution vendor.
REDHAT-BUG-979936 affects Red Hat Enterprise Linux and other distributions using the Linux Kernel.
Currently, there are no widely reported exploits for REDHAT-BUG-979936, but the vulnerability poses serious risks if left unpatched.