Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 243180 (CVE-2008-4618) - Kernel: sctp sctp_sf_violation_paramlen(), sctp_sf_abort_violation(), sctp_make_abort_violation() DOS (CVE-2008-4618)
Summary: Kernel: sctp sctp_sf_violation_paramlen(), sctp_sf_abort_violation(), sctp_ma...
Status: RESOLVED FIXED
Alias: CVE-2008-4618
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://git.kernel.org/?p=linux/kernel...
Whiteboard: [linux <2.6.27]
Keywords:
Depends on:
Blocks:
 
Reported: 2008-10-22 08:20 UTC by Stefan Behte (RETIRED)
Modified: 2013-09-05 03:32 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Stefan Behte (RETIRED) gentoo-dev Security 2008-10-22 08:20:06 UTC
CVE-2008-4618 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4618):
  The Stream Control Transmission Protocol (sctp) implementation in the
  Linux kernel before 2.6.27 does not properly handle a protocol
  violation in which a parameter has an invalid length, which allows
  attackers to cause a denial of service (panic) via unspecified
  vectors, related to sctp_sf_violation_paramlen,
  sctp_sf_abort_violation, sctp_make_abort_violation, and incorrect
  data types in function calls.