First published: Fri Mar 02 2018(Updated: )
An error in the "_sctp_make_chunk()" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited by a malicious local user to cause a kernel crash and a DoS. References: <a href="https://packetstormsecurity.com/files/146620/secunia-sctpmakechunkdos.txt">https://packetstormsecurity.com/files/146620/secunia-sctpmakechunkdos.txt</a> <a href="https://marc.info/?t=151818093200004&r=1&w=2">https://marc.info/?t=151818093200004&r=1&w=2</a> <a href="https://marc.info/?t=151818682600001&r=1&w=2">https://marc.info/?t=151818682600001&r=1&w=2</a> An upstream patch: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=07f2c7ab6f8d0a7e7c5764c4e6cc9c52951b9d9c">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=07f2c7ab6f8d0a7e7c5764c4e6cc9c52951b9d9c</a>
Credit: PSIRT-CNA@flexerasoftware.com PSIRT-CNA@flexerasoftware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <3.2.102 | |
Linux Linux kernel | >=3.3<4.1.51 | |
Linux Linux kernel | >=4.3<4.9.87 | |
Linux Linux kernel | >=4.10<4.14.25 | |
Linux Linux kernel | >=4.15<4.15.8 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Redhat Virtualization Host | =4.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.112-1 6.11.7-1 6.11.9-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.