** Changed in: linux-ti-omap4 (Ubuntu)
Status: New => Invalid
** Description changed:
- IP_RETOPTS Buffer Poisoning DoS
+ A certain Red Hat patch for the Linux kernel 2.6.32 on Red Hat Enterprise
+ Linux (RHEL) 6 allows local users to cause a denial of service (invalid
+ free operation and system crash) or possibly gain privileges via a sendmsg
+ system call with the IP_RETOPTS option, as demonstrated by hemlock.c.
+ NOTE: this vulnerability exists because of an incorrect fix for
+ CVE-2012-3552.
+
+ Break-Fix: - f6d8bd051c391c1c0458a30b2a7abcd939329259
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux (Ubuntu)
Status: New => Invalid
** Changed in: linux (Ubuntu Lucid)
Status: New => Invalid
** Changed in: linux (Ubuntu Precise)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1196796
Title:
CVE-2013-2224
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1196796/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs