A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.
The product does not initialize a critical resource.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1984024 | issue tracking third party advisory patch |
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html | third party advisory mailing list |