Integer overflow in the dccp_setsockopt_change function in net/dccp/proto.c
in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux
kernel 2.6.17-rc1 through 18.104.22.168 allows remote attackers to cause a
denial of service (panic) via a crafted integer value, related to Change L
and Change R options without at least one byte in the dccpsf_val field.
It was discovered that the Datagram Congestion Control Protocol (DCCP)
did not correctly validate its arguments. If DCCP was in use, a remote
attacker could send specially crafted network traffic and cause a system
crash, leading to a denial of service.
Updated: 2015-07-29 20:33:09 UTC (commit 9756)