A flaw was found in the sctpmakestrresetreq function in net/sctp/smmakechunk.c in the SCTP network protocol in the Linux kernel with a local user privilege access. In this flaw, an attempt to use more buffer than is allocated triggers a BUGON issue, leading to a denial of service (DOS).
[
{
"id": "CVE-2022-0322-115fe0e7",
"deprecated": false,
"digest": {
"line_hashes": [
"192853428563290332991304088778539920982",
"323246523703949480792544595603146207711",
"76316247246992447036238123549565173491",
"197569710376321187610401384971198727487"
],
"threshold": 0.9
},
"target": {
"file": "net/sctp/sm_make_chunk.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@a2d859e3fc97e79d907761550dbc03ff1b36479c",
"signature_type": "Line",
"signature_version": "v1"
},
{
"id": "CVE-2022-0322-83726e93",
"deprecated": false,
"digest": {
"length": 1022.0,
"function_hash": "258314615661799105100632813863573903896"
},
"target": {
"file": "net/sctp/sm_make_chunk.c",
"function": "sctp_make_strreset_req"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@a2d859e3fc97e79d907761550dbc03ff1b36479c",
"signature_type": "Function",
"signature_version": "v1"
}
]