First published: Tue Sep 30 2014(Updated: )
Kernel panic (via skb_over_panic) is encountered when sctp stack receive a malformed asconf chunks. skb_over_panic: text:ffffffffa01ea1c3 len:31056 put:30768 head:ffff88011bd81800 data:ffff88011bd81800 tail:0x7950 end:0x440 dev:<NULL> ------------[ cut here ]------------ kernel BUG at net/core/skbuff.c:129! [...] Call Trace: <IRQ> [<ffffffff8144fb1c>] skb_put+0x5c/0x70 [<ffffffffa01ea1c3>] sctp_addto_chunk+0x63/0xd0 [sctp] [<ffffffffa01eadaf>] sctp_process_asconf+0x1af/0x540 [sctp] [<ffffffff8152d025>] ? _read_unlock_bh+0x15/0x20 [<ffffffffa01e0038>] sctp_sf_do_asconf+0x168/0x240 [sctp] ... A remote attacker could use this flaw to crash the system. Acknowledgements: This issue was discovered by Liu Wei of Red Hat.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=2.6.12<3.2.64 | |
Linux Linux kernel | >=3.3<3.4.107 | |
Linux Linux kernel | >=3.5<3.10.61 | |
Linux Linux kernel | >=3.11<3.12.34 | |
Linux Linux kernel | >=3.13<3.14.25 | |
Linux Linux kernel | >=3.15<3.16.35 | |
Linux Linux kernel | >=3.17<3.17.4 | |
Redhat Enterprise Linux | =5.0 | |
Redhat Enterprise Mrg | =2.0 | |
Canonical Ubuntu Linux | =12.04 | |
Debian Debian Linux | =7.0 | |
Opensuse Evergreen | =11.4 | |
SUSE Linux Enterprise Software Development Kit | =12 | |
Suse Linux Enterprise Workstation Extension | =12 | |
SUSE SUSE Linux Enterprise Server | =10-sp4 | |
SUSE SUSE Linux Enterprise Server | =11-sp1 | |
SUSE SUSE Linux Enterprise Server | =11-sp2 | |
SUSE SUSE Linux Enterprise Server | =12 | |
Oracle Linux | =5 | |
Oracle Linux | =6 | |
Oracle Linux | =7 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.106-3 6.1.112-1 6.11.4-1 6.11.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.