Description
Integer overflow in the sctp_getsockopt_local_addrs_old function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) functionality in the Linux kernel before 2.6.25.9 allows local users to cause a denial of service (resource consumption and system outage) via vectors involving a large addr_num field in an sctp_getaddrs_old data structure.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1630-1 | New Linux 2.6.18 packages fix several vulnerabilities |
EUVD |
EUVD-2008-2819 | Integer overflow in the sctp_getsockopt_local_addrs_old function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) functionality in the Linux kernel before 2.6.25.9 allows local users to cause a denial of service (resource consumption and system outage) via vectors involving a large addr_num field in an sctp_getaddrs_old data structure. |
Ubuntu USN |
USN-625-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T09:14:15.024Z
Reserved: 2008-06-23T00:00:00.000Z
Link: CVE-2008-2826
No data.
Status : Modified
Published: 2008-07-02T16:41:00.000
Modified: 2026-04-23T00:35:47.467
Link: CVE-2008-2826
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN