Input validation error in Linux kernel - CVE-2013-1059
Published: July 8, 2013 / Updated: August 11, 2020
Linux kernel
Detailed vulnerability description
The vulnerability allows remote attackers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via an auth_reply message that triggers an attempted build_request operation.
How to mitigate CVE-2013-1059
Sources
- http://hkpco.kr/advisory/CVE-2013-1059.txt
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html
- http://www.openwall.com/lists/oss-security/2013/07/09/7
- http://www.ubuntu.com/usn/USN-1941-1
- http://www.ubuntu.com/usn/USN-1942-1
- https://bugzilla.redhat.com/attachment.cgi?id=767633&action=diff
- https://bugzilla.redhat.com/show_bug.cgi?id=977356