[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] CVE request: kernel: sctp: Fix kernel panic while
From:       "Steven M. Christey" <coley () linus ! mitre ! org>
Date:       2008-10-22 17:06:55
Message-ID: Pine.GSO.4.51.0810221306460.25959 () faron ! mitre ! org
[Download RAW message or body]


======================================================
Name: CVE-2008-4618
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4618
Reference: MLIST:[oss-security] 20081006 CVE request: kernel: sctp: Fix kernel panic while \
                process protocol violation parameter
Reference: URL:http://www.openwall.com/lists/oss-security/2008/10/06/1
Reference: CONFIRM:http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git;a=commit;h=ba0166708ef4da7eeb61dd92bbba4d5a749d6561
                
Reference: CONFIRM:http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27

The Stream Control Transmission Protocol (sctp) implementation in the
Linux kernel before 2.6.27 does not properly handle a protocol
violation in which a parameter has an invalid length, which allows
attackers to cause a denial of service (panic) via unspecified
vectors, related to sctp_sf_violation_paramlen,
sctp_sf_abort_violation, sctp_make_abort_violation, and incorrect data
types in function calls.


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic