Описание
The sctp_sf_do_5_2_4_dupcook function in net/sctp/sm_statefuns.c in the SCTP implementation in the Linux kernel before 3.8.5 does not properly handle associations during the processing of a duplicate COOKIE ECHO chunk, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via crafted SCTP traffic.
Отчет
This issue does affect Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6. This issue does not affect Linux kernel packages as shipped with Red Hat Enterprise MRG 2 as they already contain the fix.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise MRG 2 | realtime-kernel | Not affected | ||
OpenStack 3 for RHEL 6 | kernel | Fixed | RHSA-2013:1195 | 03.09.2013 |
Red Hat Enterprise Linux 5 | kernel | Fixed | RHSA-2013:1166 | 20.08.2013 |
Red Hat Enterprise Linux 6 | kernel | Fixed | RHSA-2013:1173 | 27.08.2013 |
Показывать по
Дополнительная информация
Статус:
EPSS
5.4 Medium
CVSS2
Связанные уязвимости
The sctp_sf_do_5_2_4_dupcook function in net/sctp/sm_statefuns.c in the SCTP implementation in the Linux kernel before 3.8.5 does not properly handle associations during the processing of a duplicate COOKIE ECHO chunk, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via crafted SCTP traffic.
The sctp_sf_do_5_2_4_dupcook function in net/sctp/sm_statefuns.c in the SCTP implementation in the Linux kernel before 3.8.5 does not properly handle associations during the processing of a duplicate COOKIE ECHO chunk, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via crafted SCTP traffic.
The sctp_sf_do_5_2_4_dupcook function in net/sctp/sm_statefuns.c in th ...
The sctp_sf_do_5_2_4_dupcook function in net/sctp/sm_statefuns.c in the SCTP implementation in the Linux kernel before 3.8.5 does not properly handle associations during the processing of a duplicate COOKIE ECHO chunk, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via crafted SCTP traffic.
ELSA-2013-2542: unbreakable enterprise kernel security update (IMPORTANT)
EPSS
5.4 Medium
CVSS2