The sctp_packet_config function in net/sctp/output.c in the Linux kernel before 2.6.35.6 performs extraneous initializations of packet data structures, which allows remote attackers to cause a denial of service (panic) via a certain sequence of SCTP traffic.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
13 Feb 2023, 04:24
Type | Values Removed | Values Added |
---|---|---|
Summary | The sctp_packet_config function in net/sctp/output.c in the Linux kernel before 2.6.35.6 performs extraneous initializations of packet data structures, which allows remote attackers to cause a denial of service (panic) via a certain sequence of SCTP traffic. | |
References |
|
02 Feb 2023, 17:17
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | CVE-2010-3432 kernel: sctp: do not reset the packet during sctp_packet_config |
Information
Published : 2010-11-22 13:00
Updated : 2023-12-10 11:03
NVD link : CVE-2010-3432
Mitre link : CVE-2010-3432
CVE.ORG link : CVE-2010-3432
JSON object : View
Products Affected
canonical
- ubuntu_linux
debian
- debian_linux
linux
- linux_kernel
opensuse
- opensuse
suse
- linux_enterprise_real_time_extension
CWE
CWE-20
Improper Input Validation