CVE-2011-1770
Published: 24 June 2011
Integer underflow in the dccp_parse_options function (net/dccp/options.c) in the Linux kernel before 2.6.33.14 allows remote attackers to cause a denial of service via a Datagram Congestion Control Protocol (DCCP) packet with an invalid feature options length, which triggers a buffer over-read.
From the Ubuntu security team
Dan Rosenberg discovered that the DCCP stack did not correctly handle certain packet structures. A remote attacker could exploit this to crash the system, leading to a denial of service.
Priority
CVSS 3 base score: 7.5
Status
Package | Release | Status |
---|---|---|
linux Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.39)
|
Patches: Introduced by e77b8363b2ea7c0d89919547c1a8b0562f298b57 Fixed by a294865978b701e4d0d90135672749531b9a900d |
||
linux-ec2 Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.39)
|
linux-fsl-imx51 Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.39)
|
linux-lts-backport-maverick Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.39)
|
linux-lts-backport-natty Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.39)
|
linux-mvl-dove Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.39)
|
linux-ti-omap4 Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.39)
|
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1770
- http://marc.info/?l=linux-kernel&m=130468845209036&w=2
- https://usn.ubuntu.com/usn/usn-1167-1
- https://usn.ubuntu.com/usn/usn-1161-1
- https://usn.ubuntu.com/usn/usn-1159-1
- https://usn.ubuntu.com/usn/usn-1168-1
- https://usn.ubuntu.com/usn/usn-1162-1
- https://usn.ubuntu.com/usn/usn-1202-1
- https://usn.ubuntu.com/usn/usn-1205-1
- https://usn.ubuntu.com/usn/usn-1201-1
- https://usn.ubuntu.com/usn/usn-1204-1
- https://usn.ubuntu.com/usn/usn-1212-1
- NVD
- Launchpad
- Debian