disable generic tracking for known protocols in kernel-netfilter-conntrack in Jolla1 CVE-2014-8160 remote

asked 2017-07-25 16:53:17 +0300

this post is marked as community wiki

This post is a wiki. Anyone with karma >75 is welcome to improve it.

updated 2017-08-10 12:42:38 +0300

lpr gravatar image

net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disallowed port numbers.

This was fixed for JollaC / aquafish in SFOS 2.0.4 but jolla1 is still vulnerable.

Patch and kernel-3.2-Patch are identical, so kernel-3.4-adaptation-sbj should see the same fix.

file affected: kernel-adaptation-sbj-3.4.108.20161101.1/net/netfilter/nf_conntrack_proto_generic.c lines 15-19

edit retag flag offensive close delete