CVE-2014-7841

Published: 29 November 2014

The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk.

From the Ubuntu security team

A null pointer dereference flaw was discovered in the the Linux kernel's SCTP implementation when ASCONF is used. A remote attacker could exploit this flaw to cause a denial of service (system crash) via a malformed INIT chunk.

Priority

Medium

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)
Patches:
Introduced by d6de3097592b7ae7f8e233a4dafb088e2aa8170f
Fixed by e40607cbe270a9e8360907cb1e62ddf0736e4864
linux-armadaxp
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)
This package is not directly supported by the Ubuntu Security Team
linux-aws
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)
linux-ec2
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)
linux-flo
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)
linux-fsl-imx51
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)
linux-gke
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)
linux-goldfish
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)
linux-grouper
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)
linux-hwe
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)
linux-hwe-edge
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)
linux-linaro-omap
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)
linux-linaro-shared
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)
linux-linaro-vexpress
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)
linux-lts-quantal
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)
This package is not directly supported by the Ubuntu Security Team
linux-lts-raring
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)
linux-lts-saucy
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)
This package is not directly supported by the Ubuntu Security Team
linux-lts-trusty
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)
linux-lts-utopic
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)
linux-lts-vivid
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)
linux-lts-wily
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)
linux-lts-xenial
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)
linux-maguro
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)
linux-mako
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)
linux-manta
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)
linux-mvl-dove
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)
linux-qcm-msm
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)
linux-raspi2
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)
linux-snapdragon
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (3.18~rc5)