CVE-2008-2358

Priority
Medium
Description
Integer overflow in the dccp_feat_change function in net/dccp/feat.c in the
Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel
2.6.18, and 2.6.17 through 2.6.20, allows local users to gain privileges
via an invalid feature length, which leads to a heap-based buffer overflow.
Ubuntu-Description
Brandon Edwards discovered that the DCCP system in the kernel did not
correctly check feature lengths. A remote attacker could exploit this
to execute arbitrary code.
References
Package
Upstream:needs-triage
Patches:
Vendor:http://www.debian.org/security/2008/dsa-1592
Package
Upstream:needs-triage
Patches:
Vendor:http://www.debian.org/security/2008/dsa-1592
Package
Upstream:needs-triage
Patches:
Vendor:http://www.debian.org/security/2008/dsa-1592
Package
Source: linux (LP Ubuntu Debian)
Upstream:needs-triage
Patches:
Vendor:http://www.debian.org/security/2008/dsa-1592
Upstream:19443178fbfbf40db15c86012fc37df1a44ab857
More Information

Valid XHTML 1.0 Strict

Updated: 2015-07-15 19:29:16 UTC (commit 9690)