CVE-2013-4163 REJECTED

The ip6_append_data_mtu function in net/ipv6/ip6_output.c in the IPv6 implementation in the Linux kernel through 3.10.3 does not properly maintain information about whether the IPV6_MTU setsockopt option had been specified, which allows local users to cause a denial of service (BUG and system crash) via a crafted application that uses the UDP_CORK option in a setsockopt system call.

EPSS 0.09% · 25.0th percentile

Risk Scores

EPSS Score
0.09%
25.0th percentile

Affected Products

VendorProductVersions
Ubuntu:16.04:LTSlinux-snapdragon0
Ubuntu:14.04:LTSlinux-lts-vivid0
Ubuntu:16.04:LTSlinux-hwe0
Ubuntu:16.04:LTSlinux-aws0
Ubuntu:14.04:LTSlinux-lts-xenial0
Ubuntu:16.04:LTSlinux-raspi20
Ubuntu:14.04:LTSlinux-lts-wily0
Ubuntu:16.04:LTSlinux0
Ubuntu:14.04:LTSlinux-lts-utopic0
Ubuntu:14.04:LTSlinux-aws0
Ubuntu:16.04:LTSlinux-goldfish0, 3.4.0-4.24, 3.4.0-4.26
Ubuntu:14.04:LTSlinux0
Ubuntu:16.04:LTSlinux-gke0

Timeline

References

Open in Interactive Console →