The sctp_auth_asoc_get_hmac function in net/sctp/auth.c in the Linux kernel
before 2.6.36 does not properly validate the hmac_ids array of an SCTP
peer, which allows remote attackers to cause a denial of service (memory
corruption and panic) via a crafted value in the last element of this
Dan Rosenberg discovered that SCTP did not correctly handle HMAC
calculations. A remote attacker could send specially crafted traffic that
would crash the system, leading to a denial of service.
Updated: 2015-10-17 03:35:52 UTC (commit 10086)