6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
kernel-rt is vulnerable to arbitrary code execution. The vulnerability exists through the UDP_CORK
option in a setsockopt systemcall.
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c547dbf55d5f8cf615ccc0e7265e98db27d3fb8b
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e93b7d748be887cd7639b113ba7d7ef792a7efb9
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c547dbf55d5f8cf615ccc0e7265e98db27d3fb8b
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e93b7d748be887cd7639b113ba7d7ef792a7efb9
lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html
rhn.redhat.com/errata/RHSA-2013-1801.html
rhn.redhat.com/errata/RHSA-2014-0100.html
rhn.redhat.com/errata/RHSA-2014-0284.html
www.openwall.com/lists/oss-security/2013/10/25/5
www.securityfocus.com/bid/63359
www.ubuntu.com/usn/USN-2040-1
www.ubuntu.com/usn/USN-2042-1
www.ubuntu.com/usn/USN-2043-1
www.ubuntu.com/usn/USN-2044-1
www.ubuntu.com/usn/USN-2046-1
www.ubuntu.com/usn/USN-2049-1
www.ubuntu.com/usn/USN-2050-1
www.ubuntu.com/usn/USN-2066-1
www.ubuntu.com/usn/USN-2067-1
www.ubuntu.com/usn/USN-2069-1
www.ubuntu.com/usn/USN-2073-1
access.redhat.com/errata/RHSA-2013:1801
access.redhat.com/errata/RHSA-2014:0100
access.redhat.com/errata/RHSA-2014:0284
access.redhat.com/security/cve/CVE-2013-4470
access.redhat.com/security/updates/classification/#important
access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_MRG/2/html/Technical_Notes/RHSA-2014-0100.html
bugzilla.redhat.com/show_bug.cgi?id=1016729
bugzilla.redhat.com/show_bug.cgi?id=1023477
bugzilla.redhat.com/show_bug.cgi?id=1037770
bugzilla.redhat.com/show_bug.cgi?id=1039743
github.com/torvalds/linux/commit/c547dbf55d5f8cf615ccc0e7265e98db27d3fb8b
github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9
rhn.redhat.com/errata/RHSA-2014-0100.html
www.kernel.org/pub/linux/kernel/v3.x/patch-3.12.bz2