CVE-2008-2358

Priority
Description
Integer overflow in the dccp_feat_change function in net/dccp/feat.c in the
Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel
2.6.18, and 2.6.17 through 2.6.20, allows local users to gain privileges
via an invalid feature length, which leads to a heap-based buffer overflow.
Ubuntu-Description
Brandon Edwards discovered that the DCCP system in the kernel did not
correctly check feature lengths. A remote attacker could exploit this
to execute arbitrary code.
Notes
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (2.6.26~rc2)
Patches:
Vendor:http://www.debian.org/security/2008/dsa-1592
Upstream:19443178fbfbf40db15c86012fc37df1a44ab857
Package
Upstream:released (2.6.26~rc2)
Patches:
Vendor:http://www.debian.org/security/2008/dsa-1592
Package
Upstream:released (2.6.26~rc2)
Patches:
Vendor:http://www.debian.org/security/2008/dsa-1592
Package
Upstream:released (2.6.26~rc2)
Patches:
Vendor:http://www.debian.org/security/2008/dsa-1592
More Information

Updated: 2019-12-05 20:49:16 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)