CVE-2014-8613

NameCVE-2014-8613
DescriptionThe sctp module in FreeBSD 10.1 before p5, 10.0 before p17, 9.3 before p9, and 8.4 before p23 allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a crafted RE_CONFIG chunk.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs776416

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
kfreebsd-10 (PTS)jessie10.1~svn274115-4fixed
stretch10.3~svn300087-3fixed
buster10.3~svn300087-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
kfreebsd-10source(unstable)10.1~svn274115-2776416
kfreebsd-11unknownexperimental11.0~svn284956-1
kfreebsd-8sourcesqueeze(not affected)
kfreebsd-8source(unstable)(unfixed)
kfreebsd-9sourcewheezy9.0-10+deb70.8
kfreebsd-9source(unstable)(unfixed)

Notes

kfreebsd-9/9.0-10+deb70.8 disabled SCTP protocol
[wheezy] - kfreebsd-8 <no-dsa> (kfreebsd-8 only a test kernel, can be fixed in a point release)
[squeeze] - kfreebsd-8 <not-affected> (kfreebsd-i386/amd64 not supported in Squeeze LTS)
https://security.freebsd.org/advisories/FreeBSD-SA-15:03.sctp.asc

Search for package or bug name: Reporting problems