|Bugzilla:||1011927: CVE-2013-4387 Kernel: net: IPv6: panic when UFO=On for an interface|
The MITRE CVE dictionary describes this issue as:
net/ipv6/ip6_output.c in the Linux kernel through 3.11.4 does not properly determine the need for UDP Fragmentation Offload (UFO) processing of small packets after the UFO queueing of a large packet, which allows remote attackers to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via network traffic that triggers a large response packet.
This issue does not affect the version of the kernel package as shipped with Red Hat Enterprise Linux 5.
This issue affects the versions of Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2 may address this issue.
CVSS v2 metrics
|Access Vector:||Adjacent Network|
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Red Hat security errata
|MRG Grid for RHEL 6 Server v.2 (kernel-rt)||RHSA-2013:1490||October 31, 2013|
|Red Hat Enterprise Linux version 6 (kernel)||RHSA-2013:1645||November 20, 2013|
This page is generated automatically and has not been checked for errors or omissions.
For clarification or corrections please contact the Red Hat Security Response Team.