CVE-2013-4470

N/A Unknown
Published: November 04, 2013 Modified: April 29, 2026
View on NVD

Description

The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsockopt system call and sends both short and long packets, related to the ip_ufo_append_data function in net/ipv4/ip_output.c and the ip6_ufo_append_data function in net/ipv6/ip6_output.c.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.securityfocus.com/bid/63359
Source: secalert@redhat.com
http://www.ubuntu.com/usn/USN-2040-1
Source: secalert@redhat.com
http://www.ubuntu.com/usn/USN-2042-1
Source: secalert@redhat.com
http://www.ubuntu.com/usn/USN-2043-1
Source: secalert@redhat.com
http://www.ubuntu.com/usn/USN-2044-1
Source: secalert@redhat.com
http://www.ubuntu.com/usn/USN-2046-1
Source: secalert@redhat.com
http://www.ubuntu.com/usn/USN-2049-1
Source: secalert@redhat.com
http://www.ubuntu.com/usn/USN-2050-1
Source: secalert@redhat.com
http://www.ubuntu.com/usn/USN-2066-1
Source: secalert@redhat.com
http://www.ubuntu.com/usn/USN-2067-1
Source: secalert@redhat.com
http://www.ubuntu.com/usn/USN-2069-1
Source: secalert@redhat.com
http://www.ubuntu.com/usn/USN-2073-1
Source: secalert@redhat.com
http://rhn.redhat.com/errata/RHSA-2013-1801.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://rhn.redhat.com/errata/RHSA-2014-0100.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://rhn.redhat.com/errata/RHSA-2014-0284.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2013/10/25/5
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.securityfocus.com/bid/63359
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/USN-2040-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/USN-2042-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/USN-2043-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/USN-2044-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/USN-2046-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/USN-2049-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/USN-2050-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/USN-2066-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/USN-2067-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/USN-2069-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/USN-2073-1
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.redhat.com/show_bug.cgi?id=1023477
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
https://github.com/torvalds/linux/commit/c547dbf55d5f8cf615ccc0e7265e98db27d3fb8b
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Patch
https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Patch
https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.12.bz2
Source: af854a3a-2127-422b-91ae-364da2661108
Patch

46 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.1%
31th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

linux