Hide Forgot
A flaw was found in the Linux kernels implementation of sctp protocol in which a remote attacker can trigger an out of bounds read with an offset of up to 64kB. This may panic the machine with a page-fault and the out-of-bounds data does not seem to be returned to the remote attacker. For this attack to be sucessful, the kernel needs to have both the SCTP protocol module loaded and a process listening as an SCTP server. Upstream patch: https://github.com/torvalds/linux/commit/bf911e985d6bbaa328c20c3e05f4eb03de11fdd6 CVE assignment: http://seclists.org/oss-sec/2016/q4/509
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1397931]
This issue was resolved in the 4.8.8 stable release and was released as an update to all supported Fedora versions.
Statement: This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux 5, 6, 7, MRG-2 and realtime and will be addressed in future updates.
This issue has been addressed in the following products: Red Hat Enterprise MRG 2 Via RHSA-2017:0113 https://rhn.redhat.com/errata/RHSA-2017-0113.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:0086 https://rhn.redhat.com/errata/RHSA-2017-0086.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:0091 https://rhn.redhat.com/errata/RHSA-2017-0091.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2017:0307 https://rhn.redhat.com/errata/RHSA-2017-0307.html