The __skb_recv_datagram function in net/core/datagram.c...
Moderate severity
Unreviewed
Published
May 5, 2022
to the GitHub Advisory Database
•
Updated Feb 10, 2023
Description
Published by the National Vulnerability Database
Feb 19, 2013
Published to the GitHub Advisory Database
May 5, 2022
Last updated
Feb 10, 2023
The __skb_recv_datagram function in net/core/datagram.c in the Linux kernel before 3.8 does not properly handle the MSG_PEEK flag with zero-length data, which allows local users to cause a denial of service (infinite loop and system hang) via a crafted application.
References