CVE Database


Impact: Important
Public: 2011-08-30
CWE: CWE-662->CWE-362->CWE-672->CWE-476
Bugzilla: 714867: CVE-2011-2482 kernel: sctp dos
IAVA: 2012-A-0020


The MITRE CVE dictionary describes this issue as:

A certain Red Hat patch to the sctp_sock_migrate function in net/sctp/socket.c in the Linux kernel before 2.6.21, as used in Red Hat Enterprise Linux (RHEL) 5, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) via a crafted SCTP packet.

Find out more about CVE-2011-2482 from the MITRE CVE dictionary and NIST NVD.


This issue did not affect the Linux kernel as shipped with Red Hat Enterprise Linux 4 as it did not backport the upstream commit 3ab224be6d6. It did not affect the Linux kernels as shipped with Red Hat Enterprise Linux 6, and Red Hat Enterprise MRG as they have backported the upstream commit ea2bc483ff5 that Red Hat Enterprise Linux 5 did not. This has been addressed in Red Hat Enterprise Linux 5 via

CVSS v2 metrics

Base Score: 7.8
Base Metrics: AV:N/AC:L/Au:N/C:N/I:N/A:C
Access Vector: Network
Access Complexity: Low
Authentication: None
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
Red Hat Enterprise Linux EUS (v. 5.6 server) (kernel) RHSA-2011:1813 December 13, 2011
Red Hat Enterprise Linux version 5 (kernel) RHSA-2011:1212 September 06, 2011

External References

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.