CVE-2011-1093

Priority
Description
The dccp_rcv_state_process function in net/dccp/input.c in the Datagram
Congestion Control Protocol (DCCP) implementation in the Linux kernel
before 2.6.38 does not properly handle packets for a CLOSED endpoint, which
allows remote attackers to cause a denial of service (NULL pointer
dereference and OOPS) by sending a DCCP-Close packet followed by a
DCCP-Reset packet.
Ubuntu-Description
Johan Hovold discovered that the DCCP network stack did not correctly
handle certain packet combinations. A remote attacker could send specially
crafted network traffic that would crash the system, leading to a denial of
service.
Notes
keesMay have been introduced as late as 0c10c5d.
Was possibly fixed briefly by ddab055, but re-introduced by 410e27a.
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (2.6.38~rc8)
Patches:
Introduced by
7c657876b63cb1d8a2ec06f8fc6c37bb8412e66c
Fixed by
720dc34bbbe9493c7bd48b2243058b4e447a929d
Package
Upstream:released (2.6.38~rc8)
Package
Upstream:released (2.6.38~rc8)
Package
Upstream:released (2.6.38~rc8)
Package
Upstream:released (2.6.38~rc8)
Package
Upstream:released (2.6.38~rc8)
Package
Upstream:released (2.6.38~rc8)
Package
Upstream:released (2.6.38~rc8)
More Information

Updated: 2019-12-05 20:56:44 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)