{"id":"CVE-2016-9555","details":"The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.","modified":"2026-03-12T22:28:58.937714Z","published":"2016-11-28T03:59:17.097Z","related":["SUSE-SU-2016:3039-1","SUSE-SU-2016:3049-1","SUSE-SU-2016:3063-1","SUSE-SU-2016:3093-1","SUSE-SU-2016:3094-1","SUSE-SU-2016:3096-1","SUSE-SU-2016:3098-1","SUSE-SU-2016:3100-1","SUSE-SU-2016:3104-1","SUSE-SU-2016:3109-1","SUSE-SU-2016:3111-1","SUSE-SU-2016:3112-1","SUSE-SU-2016:3113-1","SUSE-SU-2016:3116-1","SUSE-SU-2016:3117-1","SUSE-SU-2016:3119-1","SUSE-SU-2016:3169-1","SUSE-SU-2016:3183-1","SUSE-SU-2016:3197-1","SUSE-SU-2016:3205-1","SUSE-SU-2016:3206-1","SUSE-SU-2016:3247-1","SUSE-SU-2016:3249-1","SUSE-SU-2017:0333-1","SUSE-SU-2017:0407-1","SUSE-SU-2017:0437-1","SUSE-SU-2017:0494-1","SUSE-SU-2017:1102-1","openSUSE-SU-2024:10128-1"],"references":[{"type":"WEB","url":"https://groups.google.com/forum/#%21topic/syzkaller/pAUcHsUJbjk"},{"type":"ADVISORY","url":"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.8"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00067.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00077.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00087.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0086.html"},{"type":"ADVISORY","url":"https://bto.bluecoat.com/security-advisory/sa134"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00054.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00076.html"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/11/22/18"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/94479"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1037339"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00073.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0091.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00044.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00055.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00056.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00070.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0113.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0307.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1397930"},{"type":"FIX","url":"https://github.com/torvalds/linux/commit/bf911e985d6bbaa328c20c3e05f4eb03de11fdd6"},{"type":"FIX","url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bf911e985d6bbaa328c20c3e05f4eb03de11fdd6"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-9555.json","unresolved_ranges":[{"events":[{"introduced":"3.2"},{"fixed":"3.2.85"}]},{"events":[{"introduced":"3.3"},{"fixed":"3.10.105"}]},{"events":[{"introduced":"3.11"},{"fixed":"3.12.68"}]},{"events":[{"introduced":"3.13"},{"fixed":"3.16.40"}]},{"events":[{"introduced":"3.17"},{"fixed":"3.18.49"}]},{"events":[{"introduced":"3.19"},{"fixed":"4.4.32"}]},{"events":[{"introduced":"4.5.0"},{"fixed":"4.8.8"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}