Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <Pine.GSO.4.51.0810221306460.25959@faron.mitre.org>
Date: Wed, 22 Oct 2008 13:06:55 -0400 (EDT)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security@...ts.openwall.com
cc: "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE request: kernel: sctp: Fix kernel panic while
 process protocol violation parameter


======================================================
Name: CVE-2008-4618
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4618
Reference: MLIST:[oss-security] 20081006 CVE request: kernel: sctp: Fix kernel panic while process protocol violation parameter
Reference: URL:http://www.openwall.com/lists/oss-security/2008/10/06/1
Reference: CONFIRM:http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git;a=commit;h=ba0166708ef4da7eeb61dd92bbba4d5a749d6561
Reference: CONFIRM:http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27

The Stream Control Transmission Protocol (sctp) implementation in the
Linux kernel before 2.6.27 does not properly handle a protocol
violation in which a parameter has an invalid length, which allows
attackers to cause a denial of service (panic) via unspecified
vectors, related to sctp_sf_violation_paramlen,
sctp_sf_abort_violation, sctp_make_abort_violation, and incorrect data
types in function calls.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.