CVE-2014-5077
Published: 1 August 2014
The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction.
From the Ubuntu security team
Jason Gunthorpe reported a flaw with SCTP authentication in the Linux kernel. A remote attacker could exploit this flaw to cause a denial of service (NULL pointer dereference and OOPS).
Priority
Status
Package | Release | Status |
---|---|---|
linux Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
Patches: Introduced by 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 |
||
linux-armadaxp Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
This package is not directly supported by the Ubuntu Security Team | ||
linux-aws Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
linux-ec2 Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
linux-flo Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
linux-fsl-imx51 Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
linux-gke Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
linux-goldfish Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
linux-grouper Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
linux-hwe Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
linux-hwe-edge Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
linux-linaro-omap Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
linux-linaro-shared Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
linux-linaro-vexpress Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
linux-lts-quantal Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
This package is not directly supported by the Ubuntu Security Team | ||
linux-lts-raring Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
linux-lts-saucy Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
This package is not directly supported by the Ubuntu Security Team | ||
linux-lts-trusty Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
linux-lts-utopic Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
linux-lts-vivid Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
linux-lts-wily Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
linux-lts-xenial Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
linux-maguro Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
linux-mako Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
linux-manta Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
linux-mvl-dove Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
linux-qcm-msm Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
linux-raspi2 Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
linux-snapdragon Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
linux-ti-omap4 Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16)
|
Notes
Author | Note |
---|---|
jdstrand | android kernels (goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 13.10 preview kernels android kernels (flo, goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 14.04 preview kernels linux-lts-saucy no longer receives official support linux-lts-quantal no longer receives official support |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077
- https://ubuntu.com/security/notices/USN-2332-1
- https://ubuntu.com/security/notices/USN-2333-1
- https://ubuntu.com/security/notices/USN-2334-1
- https://ubuntu.com/security/notices/USN-2335-1
- https://ubuntu.com/security/notices/USN-2358-1
- https://ubuntu.com/security/notices/USN-2359-1
- NVD
- Launchpad
- Debian