First published: Tue Jun 09 2020(Updated: )
An out-of-bounds memory write flaw was found in how the Linux kernel’s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allows an unauthenticated remote user to crash the system, causing a denial of service. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1160.rt56.1131.el7 | 0:3.10.0-1160.rt56.1131.el7 |
redhat/kernel | <0:3.10.0-1160.el7 | 0:3.10.0-1160.el7 |
Linux Linux kernel | <=4.11.12 | |
Linux Linux kernel | =4.12 | |
Netapp Cloud Backup | ||
Netapp A250 Firmware | ||
Netapp A250 | ||
Netapp Fas 500f Firmware | ||
Netapp Fas 500f | ||
Netapp Aff 500f Firmware | ||
Netapp Aff 500f | ||
Netapp Solidfire Baseboard Management Controller Firmware | ||
Netapp Solidfire Baseboard Management Controller | ||
redhat/kernel | <4.12 | 4.12 |
A mitigation to this flaw would be to no longer use IPV6 on affected hardware until the kernel has been updated or to disable Voice Over IP H.323 module. Existing systems that have h323-conntrack-nat kernel module loaded will need to unload the "nf_conntrack_h323" kernel module and blacklist it ( See https://access.redhat.com/solutions/41278 for a guide on how to blacklist modules).
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.