Release date:
Updated on:
Affected Systems:
Linux kernel 2.6.x
Description:
--------------------------------------------------------------------------------
Bugtraq id: 49373
Cve id: CVE-2011-2482
Linux Kernel is the Kernel of the Linux operating system.
Linux Kernel has a remote denial of service vulnerability in the implementation of SCTP protocol. Remote attackers can exploit this vulnerability to cause Kernel crash and DOS to legitimate users.
Currently, LKSCTP receives sctp_receive_queue and pd_loby data buffer calculations. However, when the data is incomplete, the data in frag_list is not calculated, and the data in the reasm and loby queues in the sctp_ulpq structure is not calculated. When there is data in these queues, because the sk_rmem_alloc of the oldsk does not change to 0 after the socket is damaged, the asserted failure message is displayed in inet_sock_destruct.
<* Source: vendor
Link: http://git.kernel.org /? P = linux/kernel/git/torvalds/linux-2.6.git; a = commitdiff; h = ea2bc483ff5caada7c4aa0d5fbf87d3a6590273d
Http://permalink.gmane.org/gmane.comp.security.oss.general/5795
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Linux
-----
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://www.kernel.org/