First published: Fri Jun 30 2006(Updated: )
SCTP conntrack (ip_conntrack_proto_sctp.c) in netfilter for Linux kernel 2.6.17 before 2.6.17.3 and 2.6.16 before 2.6.16.23 allows remote attackers to cause a denial of service (crash) via a packet without any chunks, which causes a variable to contain an invalid value that is later used to dereference a pointer.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | =2.6.16.16 | |
Linux Linux kernel | =2.6.17.2 | |
Linux Linux kernel | =2.6.16.18 | |
Linux Linux kernel | =2.6.16.13 | |
Linux Linux kernel | =2.6.16.15 | |
Linux Linux kernel | =2.6.16.1 | |
Linux Linux kernel | =2.6.17 | |
Linux Linux kernel | =2.6.16.11 | |
Linux Linux kernel | =2.6.16.14 | |
Linux Linux kernel | =2.6.16.21 | |
Linux Linux kernel | =2.6.17.1 | |
Linux Linux kernel | =2.6.16 | |
Linux Linux kernel | =2.6.16.22 | |
Linux Linux kernel | =2.6.16.10 | |
Linux Linux kernel | =2.6.16.17 | |
Linux Linux kernel | =2.6.16.12 | |
Linux Linux kernel | =2.6.16.2 | |
Linux Linux kernel | =2.6.16.19 | |
Linux Linux kernel | =2.6.16.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.