Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 4 Oct 2010 15:18:49 -0400 (EDT)
From: Josh Bressers <>
Cc: Eugene Teo <>, coley <>
Subject: Re: CVE request: kernel: SCTP memory corruption in
 HMAC handling

Please use CVE-2010-3705



----- "Dan Rosenberg" <> wrote:

> Reference:
> When parsing a peer's supported HMAC authentication options in the
> sctp_auth_asoc_get_hmac() function, a malicious peer can craft their
> HMAC array in such a way as to cause memory corruption (out-of-bounds
> read followed by use of retrieved out-of-bounds data), which at the
> very least could cause a denial of service via kernel panic, and
> possibly worse.  It appears this could be triggered remotely when
> connecting to a malicious peer, or locally by a user acting as both
> endpoints.  In both cases, the "auth_enable" sysctl must be set in
> order to trigger the bug.
> -Dan

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ