CVE-2008-2358

Priority
Medium
Description
Integer overflow in the dccp_feat_change function in net/dccp/feat.c in the
Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel
2.6.18, and 2.6.17 through 2.6.20, allows local users to gain privileges
via an invalid feature length, which leads to a heap-based buffer overflow.
Ubuntu-Description
Brandon Edwards discovered that the DCCP system in the kernel did not
correctly check feature lengths. A remote attacker could exploit this
to execute arbitrary code.
References
Package
Upstream:needs-triage
Ubuntu 8.04 LTS (Hardy Heron):DNE
Patches:
Vendor:http://www.debian.org/security/2008/dsa-1592
Package
Upstream:needs-triage
Ubuntu 8.04 LTS (Hardy Heron):DNE
Patches:
Vendor:http://www.debian.org/security/2008/dsa-1592
Package
Upstream:needs-triage
Ubuntu 8.04 LTS (Hardy Heron):DNE
Patches:
Vendor:http://www.debian.org/security/2008/dsa-1592
Package
Source: linux (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 8.04 LTS (Hardy Heron):released (2.6.24-19.36)
Patches:
Vendor:http://www.debian.org/security/2008/dsa-1592
Upstream:19443178fbfbf40db15c86012fc37df1a44ab857
More Information

Valid XHTML 1.0 Strict

Updated: 2012-06-01 15:18:49 UTC (commit 5347)