Description
The dccp_rcv_state_process function in net/dccp/input.c in the Datagram
Congestion Control Protocol (DCCP) implementation in the Linux kernel
before 2.6.38 does not properly handle packets for a CLOSED endpoint, which
allows remote attackers to cause a denial of service (NULL pointer
dereference and OOPS) by sending a DCCP-Close packet followed by a
DCCP-Reset packet.
Ubuntu-Description
Johan Hovold discovered that the DCCP network stack did not correctly
handle certain packet combinations. A remote attacker could send specially
crafted network traffic that would crash the system, leading to a denial of
service.
Notes
kees | May have been introduced as late as 0c10c5d.
Was possibly fixed briefly by ddab055, but re-introduced by 410e27a. |
Package
Upstream: | released
(2.6.38~rc8)
|
Patches:
Package
Upstream: | released
(2.6.38~rc8)
|
Package
Upstream: | released
(2.6.38~rc8)
|
Package
Upstream: | released
(2.6.38~rc8)
|
Package
Upstream: | released
(2.6.38~rc8)
|
Package
Upstream: | released
(2.6.38~rc8)
|
Package
Upstream: | released
(2.6.38~rc8)
|
Package
Upstream: | released
(2.6.38~rc8)
|
Updated: 2019-12-05 20:56:44 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)