Описание
The sctp_auth_asoc_get_hmac function in net/sctp/auth.c in the Linux kernel before 2.6.36 does not properly validate the hmac_ids array of an SCTP peer, which allows remote attackers to cause a denial of service (memory corruption and panic) via a crafted value in the last element of this array.
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | not-affected | |
hardy | released | 2.6.24-28.80 |
jaunty | released | 2.6.28-19.66 |
karmic | released | 2.6.31-22.67 |
lucid | released | 2.6.32-25.45 |
maverick | released | 2.6.35-22.35 |
upstream | needed |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | DNE | |
hardy | DNE | |
karmic | released | 2.6.31-307.21 |
lucid | released | 2.6.32-309.18 |
maverick | ignored | end of life |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | DNE | |
hardy | DNE | |
karmic | released | 2.6.31-112.30 |
lucid | released | 2.6.31-608.22 |
maverick | DNE | |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | DNE | |
hardy | DNE | |
karmic | DNE | |
lucid | released | 2.6.35-25.44~lucid1 |
maverick | DNE | |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | DNE | |
hardy | DNE | |
karmic | ignored | end of life |
lucid | released | 2.6.32-216.33 |
maverick | released | 2.6.32-416.33 |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | not-affected | |
devel | DNE | |
hardy | DNE | |
jaunty | DNE | |
karmic | DNE | |
lucid | DNE | |
maverick | DNE | |
upstream | not-affected |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | not-affected | |
hardy | DNE | |
karmic | DNE | |
lucid | DNE | |
maverick | released | 2.6.35-903.22 |
upstream | needs-triage |
Показывать по
Ссылки на источники
EPSS
8.3 High
CVSS2
Связанные уязвимости
The sctp_auth_asoc_get_hmac function in net/sctp/auth.c in the Linux kernel before 2.6.36 does not properly validate the hmac_ids array of an SCTP peer, which allows remote attackers to cause a denial of service (memory corruption and panic) via a crafted value in the last element of this array.
The sctp_auth_asoc_get_hmac function in net/sctp/auth.c in the Linux kernel before 2.6.36 does not properly validate the hmac_ids array of an SCTP peer, which allows remote attackers to cause a denial of service (memory corruption and panic) via a crafted value in the last element of this array.
The sctp_auth_asoc_get_hmac function in net/sctp/auth.c in the Linux k ...
The sctp_auth_asoc_get_hmac function in net/sctp/auth.c in the Linux kernel before 2.6.36 does not properly validate the hmac_ids array of an SCTP peer, which allows remote attackers to cause a denial of service (memory corruption and panic) via a crafted value in the last element of this array.
ELSA-2010-2011: Unbreakable enterprise kernel security and bug fix update (IMPORTANT)
EPSS
8.3 High
CVSS2