Description
A flaw was found in the Linux kernel present since v4.0-rc1 and through
v4.13-rc4. A crafted network packet sent remotely by an attacker may force
the kernel to enter an infinite loop in the cipso_v4_optptr() function in
net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default
configuration of LSM (Linux Security Module) and NetLabel should be set up
on a system before an attacker could leverage this flaw.
Ubuntu-Description
Yves Younan discovered that the CIPSO labeling implementation in the Linux
kernel did not properly handle IP header options in some situations. A
remote attacker could use this to specially craft network traffic that
could cause a denial of service (infinite loop).
Notes
| tyhicks | This issue affects non-default configurations where SELinux or SMACK
is being used instead of AppArmor and networking labeling has been
configured. It is unlikely that Ubuntu users would be affected by this issue. |
| sbeattie | further hardening discussion (and why it's likely not
needed) around this code in the two netdev emails in the marc.info
urls in the references section |
Package
| Upstream: | released
(4.13~rc5)
|
| Ubuntu 18.04 LTS: | not-affected
(4.13.0-16.19)
|
| Ubuntu 16.04 ESM: | released
(4.4.0-138.164)
|
| Ubuntu 14.04 ESM: | not-affected
|
Patches:
Package
| Upstream: | released
(4.13~rc5)
|
| Ubuntu 18.04 LTS: | not-affected
(4.15.0-1001.1)
|
| Ubuntu 16.04 ESM: | released
(4.4.0-1070.80)
|
| Ubuntu 14.04 ESM: | released
(4.4.0-1032.35)
|
Patches:
Package
| Upstream: | released
(4.13~rc5)
|
| Ubuntu 18.04 LTS: | not-affected
(4.15.0-1002.2)
|
| Ubuntu 16.04 ESM: | released
(4.13.0-1005.7)
|
| Ubuntu 14.04 ESM: | not-affected
(4.15.0-1023.24~14.04.1)
|
Patches:
Package
| Upstream: | released
(4.13~rc5)
|
| Ubuntu 18.04 LTS: | not-affected
(4.18.0-1003.3~18.04.1)
|
| Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
| Upstream: | released
(4.13~rc5)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
| Upstream: | released
(4.13~rc5)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
| Upstream: | released
(4.13~rc5)
|
| Ubuntu 18.04 LTS: | not-affected
(4.15.0-1001.1)
|
| Ubuntu 16.04 ESM: | released
(4.13.0-1002.5)
|
| Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
| Upstream: | released
(4.13~rc5)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
| Upstream: | released
(4.13~rc5)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
| Upstream: | released
(4.13~rc5)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
| Upstream: | released
(4.13~rc5)
|
| Ubuntu 18.04 LTS: | not-affected
|
| Ubuntu 16.04 ESM: | released
(4.13.0-26.29~16.04.2)
|
| Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
| Upstream: | released
(4.13~rc5)
|
| Ubuntu 18.04 LTS: | not-affected
(4.18.0-8.9~18.04.1)
|
| Ubuntu 16.04 ESM: | released
(4.13.0-26.29~16.04.2)
|
| Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
| Upstream: | released
(4.13~rc5)
|
| Ubuntu 18.04 LTS: | not-affected
(4.15.0-1002.2)
|
| Ubuntu 16.04 ESM: | released
(4.4.0-1036.42)
|
| Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
| Upstream: | released
(4.13~rc5)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
| Upstream: | released
(4.13~rc5)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
(trusty was ignored [out of standard support])
|
Patches:
Package
| Upstream: | released
(4.13~rc5)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
(trusty was ignored [out of standard support])
|
Patches:
Package
| Upstream: | released
(4.13~rc5)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
(trusty was ignored [out of standard support])
|
Patches:
Package
| Upstream: | released
(4.13~rc5)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | released
(4.4.0-138.164~14.04.1)
|
Patches:
Package
| Upstream: | released
(4.13~rc5)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
| Upstream: | released
(4.13~rc5)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
| Upstream: | released
(4.13~rc5)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
| Upstream: | released
(4.13~rc5)
|
| Ubuntu 18.04 LTS: | not-affected
(4.15.0-1002.3)
|
| Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
| Upstream: | released
(4.13~rc5)
|
| Ubuntu 18.04 LTS: | not-affected
(4.13.0-1005.5)
|
| Ubuntu 14.04 ESM: | DNE
|
Patches:
Updated: 2022-04-13 13:12:20 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)