First published: Wed Nov 13 2013(Updated: )
Commit 1e2bd517c108816220f262d7954b697af03b5f9c ("udp6: Fix udp fragmentation for tunnel traffic.") changed the calculation if there is enough space to include a fragment header in the skb from a skb->mac_header dervived one to skb_headroom. Because we already peeled off the skb to transport_header this is wrong. This fixes a panic Saran Neti reported. He used the tbf scheduler which skb_gso_segments the skb. The offsets get negative and we panic in memcpy because the skb was erroneously not expanded at the head. Introduced by: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1e2bd517c108816220f262d7954b697af03b5f9c">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1e2bd517c108816220f262d7954b697af03b5f9c</a> Introduced in: v3.10-rc5 Upstream fix: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0e033e0">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0e033e0</a> References: <a href="http://marc.info/?l=linux-netdev&m=138305762205012&w=2">http://marc.info/?l=linux-netdev&m=138305762205012&w=2</a> Acknowledgements: Red Hat would like to thank Saran Neti of TELUS Security Labs for reporting this issue.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=3.9.8<=3.10.23 | |
Linux Linux kernel | >=3.11<3.12.4 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =13.10 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.