CVE-2011-1770

Priority
Description
Integer underflow in the dccp_parse_options function (net/dccp/options.c)
in the Linux kernel before 2.6.33.14 allows remote attackers to cause a
denial of service via a Datagram Congestion Control Protocol (DCCP) packet
with an invalid feature options length, which triggers a buffer over-read.
Ubuntu-Description
Dan Rosenberg discovered that the DCCP stack did not correctly handle
certain packet structures. A remote attacker could exploit this to crash
the system, leading to a denial of service.
Notes
Package
Upstream:released (2.6.39)
Package
Upstream:released (2.6.39)
Package
Upstream:released (2.6.39)
Package
Upstream:released (2.6.39)
Package
Upstream:released (2.6.39)
Package
Upstream:released (2.6.39)
More Information

Updated: 2019-12-05 20:57:03 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)