Описание
The Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.27 does not properly handle a protocol violation in which a parameter has an invalid length, which allows attackers to cause a denial of service (panic) via unspecified vectors, related to sctp_sf_violation_paramlen, sctp_sf_abort_violation, sctp_make_abort_violation, and incorrect data types in function calls.
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | not-affected | |
gutsy | DNE | |
hardy | released | 2.6.24-22.45 |
intrepid | not-affected | |
upstream | released | 2.6.27~rc9 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 2.6.15-53.74 |
devel | DNE | |
gutsy | DNE | |
hardy | DNE | |
intrepid | DNE | |
upstream | released | 2.6.27~rc9 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | DNE | |
gutsy | released | 2.6.22-16.60 |
hardy | DNE | |
intrepid | DNE | |
upstream | released | 2.6.27~rc9 |
Показывать по
EPSS
7.8 High
CVSS2
Связанные уязвимости
The Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.27 does not properly handle a protocol violation in which a parameter has an invalid length, which allows attackers to cause a denial of service (panic) via unspecified vectors, related to sctp_sf_violation_paramlen, sctp_sf_abort_violation, sctp_make_abort_violation, and incorrect data types in function calls.
The Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.27 does not properly handle a protocol violation in which a parameter has an invalid length, which allows attackers to cause a denial of service (panic) via unspecified vectors, related to sctp_sf_violation_paramlen, sctp_sf_abort_violation, sctp_make_abort_violation, and incorrect data types in function calls.
The Stream Control Transmission Protocol (sctp) implementation in the ...
The Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.27 does not properly handle a protocol violation in which a parameter has an invalid length, which allows attackers to cause a denial of service (panic) via unspecified vectors, related to sctp_sf_violation_paramlen, sctp_sf_abort_violation, sctp_make_abort_violation, and incorrect data types in function calls.
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации
EPSS
7.8 High
CVSS2