Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1113967 - (CVE-2014-4667) CVE-2014-4667 kernel: sctp: sk_ack_backlog wrap-around problem
CVE-2014-4667 kernel: sctp: sk_ack_backlog wrap-around problem
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20140612,repor...
: Security
Depends On: 1085932 1112726 1113969 1113971 1113972 1113973
Blocks: 1110682
  Show dependency treegraph
 
Reported: 2014-06-27 07:10 EDT by Petr Matousek
Modified: 2015-07-31 08:24 EDT (History)
32 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
An integer underflow flaw was found in the way the Linux kernel's Stream Control Transmission Protocol (SCTP) implementation processed certain COOKIE_ECHO packets. By sending a specially crafted SCTP packet, a remote attacker could use this flaw to prevent legitimate connections to a particular SCTP server socket to be made.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2014-09-19 05:33:10 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:0913 normal SHIPPED_LIVE Important: kernel-rt security update 2014-07-22 18:00:11 EDT
Red Hat Product Errata RHSA-2014:1023 normal SHIPPED_LIVE Important: kernel security and bug fix update 2014-08-06 17:10:29 EDT
Red Hat Product Errata RHSA-2014:1167 normal SHIPPED_LIVE Important: kernel security and bug fix update 2014-09-09 17:55:48 EDT

  None (edit)
Description Petr Matousek 2014-06-27 07:10:37 EDT
Description of the problem:
For a TCP-style socket, while processing the COOKIE_ECHO chunk in
sctp_sf_do_5_1D_ce(), after it has passed a series of sanity check, a
new association would be created in sctp_unpack_cookie(), but afterwards,
some processing maybe failed, and sctp_association_free() will be called
to free the previously allocated association, in sctp_association_free(),
sk_ack_backlog value is decremented for this socket, since the initial
value for sk_ack_backlog is 0, after the decrement, it will be 65535, a
wrap-around problem happens, and if we want to establish new associations
afterward in the same socket, ABORT would be triggered since sctp deem the
accept queue as full. 

A remote attacker can block further connection to the particular sctp
server socket by sending a specially crafted sctp packet.

Upstream patch:
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d3217b15a19a4779c39b212358a5c71d725822ee

Acknowledgements:

Red Hat would like to thank Gopal Reddy Kodudula of Nokia Siemens Networks for reporting this issue.
Comment 3 Petr Matousek 2014-06-27 07:14:42 EDT
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1113973]
Comment 4 Fedora Update System 2014-06-30 06:28:45 EDT
kernel-3.14.9-200.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 5 Petr Matousek 2014-07-22 12:15:27 EDT
Statement:

This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5.
Comment 6 errata-xmlrpc 2014-07-22 14:04:57 EDT
This issue has been addressed in following products:

  MRG for RHEL-6 v.2

Via RHSA-2014:0913 https://rhn.redhat.com/errata/RHSA-2014-0913.html
Comment 7 Fedora Update System 2014-07-25 06:08:27 EDT
kernel-3.14.13-100.fc19 has been pushed to the Fedora 19 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 8 Martin Prpič 2014-08-05 08:09:18 EDT
IssueDescription:

An integer underflow flaw was found in the way the Linux kernel's Stream Control Transmission Protocol (SCTP) implementation processed certain COOKIE_ECHO packets. By sending a specially crafted SCTP packet, a remote attacker could use this flaw to prevent legitimate connections to a particular SCTP server socket to be made.
Comment 9 errata-xmlrpc 2014-08-06 13:11:57 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 7

Via RHSA-2014:1023 https://rhn.redhat.com/errata/RHSA-2014-1023.html
Comment 10 errata-xmlrpc 2014-09-09 13:57:35 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2014:1167 https://rhn.redhat.com/errata/RHSA-2014-1167.html

Note You need to log in before you can comment on or make changes to this bug.