Description of the problem: A flaw was found in the way Linux kernel processed authenticated COOKIE_ECHO chunks. A remote attacker could use this flaw to crash the system by sending a maliciously prepared SCTP handshake in order to trigger a NULL pointer dereference on the server. Introduced by: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bbd0d59809f9 Acknowledgements: Red Hat would like to thank Nokia Siemens Networks for reporting this issue.
Statement: This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5. Future kernel updates for Red Hat Enterprise MRG 2 may address this issue.
Upstream patch submission: http://patchwork.ozlabs.org/patch/325898/
(In reply to Petr Matousek from comment #5) > Upstream patch submission: > > http://patchwork.ozlabs.org/patch/325898/ Upstream commit: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ec0223ec48a9
kernel-3.13.5-202.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
kernel-3.13.5-103.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2014:0328 https://rhn.redhat.com/errata/RHSA-2014-0328.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6.3 EUS - Server and Compute Node Only Via RHSA-2014:0419 https://rhn.redhat.com/errata/RHSA-2014-0419.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6.4 EUS - Server and Compute Node Only Via RHSA-2014:0432 https://rhn.redhat.com/errata/RHSA-2014-0432.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6.2 AUS Via RHSA-2014:0520 https://rhn.redhat.com/errata/RHSA-2014-0520.html