CVE-2022-0322

Source
https://cve.org/CVERecord?id=CVE-2022-0322
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-0322.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-0322
Downstream
Related
Published
2022-03-25T18:02:58Z
Modified
2026-05-08T04:27:27.052531Z
Summary
[none]
Details

A flaw was found in the sctpmakestrresetreq function in net/sctp/smmakechunk.c in the SCTP network protocol in the Linux kernel with a local user privilege access. In this flaw, an attempt to use more buffer than is allocated triggers a BUGON issue, leading to a denial of service (DOS).

Database specific
{
    "cwe_ids": [
        "CWE-681"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/0xxx/CVE-2022-0322.json",
    "cna_assigner": "redhat"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
a2d859e3fc97e79d907761550dbc03ff1b36479c

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-0322.json"