** Description changed: - A flaw was found in the way Linux kernel's SCTP network protocol - implementation handled duplicate cookies. A transient empty association - is created while processing the duplicate cookie chunk that userspace - could query, potentially leading to NULL pointer dereference. A remote - attacker able to initiate SCTP connection to the system could use this - flaw to create transient conditions that could lead to remote system - crash if remote system user is querying SCTP connection info at the time - these conditions exist. + The sctp_sf_do_5_2_4_dupcook function in net/sctp/sm_statefuns.c in the + SCTP implementation in the Linux kernel before 3.8.5 does not properly + handle associations during the processing of a duplicate COOKIE ECHO + chunk, which allows remote attackers to cause a denial of service (NULL + pointer dereference and system crash) or possibly have unspecified other + impact via crafted SCTP traffic. Break-Fix: - f2815633504b442ca0b0605c16bf3d88a3a0fcea
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1194445 Title: CVE-2013-2206 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1194445/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs