[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ELSA-2014-3069 -- Oracle kernel-uek_ofa_mlnx_en

ID: oval:org.secpod.oval:def:1500675Date: (C)2014-11-07   (M)2024-04-17
Class: PATCHFamily: unix




For a TCP-style socket, while processing the COOKIE_ECHO chunk in sctp_sf_do_5_1D_ce(), after it has passed a series of sanity check, a new association would be created in sctp_unpack_cookie(), but afterwards, some processing maybe failed, and sctp_association_free() will be called to free the previously allocated association, in sctp_association_free(), sk_ack_backlog value is decremented for this socket, since the initial value for sk_ack_backlog is 0, after the decrement, it will be 65535, a wrap-around problem happens, and if we want to establish new associations afterward in the same socket, ABORT would be triggered since sctp deem the accept queue as full. Fix this issue by only decrementing sk_ack_backlog for associations in the endpoint's list.

Platform:
Oracle Linux 6
Product:
kernel-uek
ofa
mlnx_en
Reference:
ELSA-2014-3069
CVE-2014-4667
CVE    1
CVE-2014-4667
CPE    4
cpe:/a:oracle:ofa
cpe:/a:oracle:mlnx_en
cpe:/o:oracle:linux:6
cpe:/o:oracle:kernel-uek
...

© SecPod Technologies