CVE-2014-8612

NameCVE-2014-8612
DescriptionMultiple array index errors in the Stream Control Transmission Protocol (SCTP) module in FreeBSD 10.1 before p5, 10.0 before p17, 9.3 before p9, and 8.4 before p23 allow local users to (1) gain privileges via the stream id to the setsockopt function, when setting the SCTIP_SS_VALUE option, or (2) read arbitrary kernel memory via the stream id to the getsockopt function, when getting the SCTP_SS_PRIORITY option.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs776415

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
kfreebsd-10 (PTS)buster10.3~svn300087-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
kfreebsd-10source(unstable)10.1~svn274115-2776415
kfreebsd-11unknownexperimental11.0~svn284956-1
kfreebsd-8sourcesqueeze(not affected)
kfreebsd-8source(unstable)(unfixed)
kfreebsd-9sourcewheezy9.0-10+deb70.8
kfreebsd-9source(unstable)(unfixed)

Notes

kfreebsd-9/9.0-10+deb70.8 disabled SCTP protocol
[wheezy] - kfreebsd-8 <no-dsa> (kfreebsd-8 only a test kernel, can be fixed in a point release)
[squeeze] - kfreebsd-8 <not-affected> (kfreebsd-i386/amd64 not supported in Squeeze LTS)
https://security.FreeBSD.org/advisories/FreeBSD-SA-15:02.kmem.asc

Search for package or bug name: Reporting problems