CVE-2011-1573

Priority
Medium
Description
net/sctp/sm_make_chunk.c in the Linux kernel before 2.6.34, when
addip_enable and auth_enable are used, does not consider the amount of zero
padding during calculation of chunk lengths for (1) INIT and (2) INIT ACK
chunks, which allows remote attackers to cause a denial of service (OOPS)
via crafted packet data.
Ubuntu-Description
It was discovered that the Stream Control Transmission Protocol (SCTP)
implementation incorrectly calculated lengths. If the net.sctp.addip_enable
variable was turned on, a remote attacker could send specially crafted
traffic to crash the system.
References
Bugs
Package
Upstream:released (2.6.34~rc6)
Package
Upstream:released (2.6.34~rc6)
Package
Upstream:released (2.6.34~rc6)
Package
Upstream:released (2.6.34~rc6)
Package
Upstream:released (2.6.34~rc6)
Patches:
Package
Upstream:released (2.6.34~rc6)
Package
Upstream:released (2.6.34~rc6)
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (2.6.34~rc6)
Patches:
Introduced by 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2Fixed by a8170c35e738d62e9919ce5b109cf4ed66e95bde
Package
Upstream:released (2.6.34~rc6)
Package
Upstream:released (2.6.34~rc6)
Package
Upstream:released (2.6.34~rc6)
More Information

Updated: 2017-10-18 19:14:45 UTC (commit 13547)