A certain Red Hat patch to the sctp_sock_migrate function in net/sctp/socket.c in the Linux kernel prior to 2.6.21, as used in Red Hat Enterprise Linux (RHEL) 5, allows remote malicious users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted SCTP packet.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
linux linux kernel |