CVE-2011-1093
18.07.2011, 22:55
The dccp_rcv_state_process function in net/dccp/input.c in the Datagram Congestion Control Protocol (DCCP) implementation in the Linux kernel before 2.6.38 does not properly handle packets for a CLOSED endpoint, which allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by sending a DCCP-Close packet followed by a DCCP-Reset packet.Enginsight
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 𝑥 < 2.6.38 |
redhat | enterprise_linux_aus | 5.6 |
redhat | enterprise_linux_desktop | 5.0 |
redhat | enterprise_linux_eus | 5.6 |
redhat | enterprise_linux_server | 5.0 |
redhat | enterprise_linux_workstation | 5.0 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Ubuntu Product | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
linux |
| ||||||||||
linux-ec2 |
| ||||||||||
linux-fsl-imx51 |
| ||||||||||
linux-lts-backport-maverick |
| ||||||||||
linux-lts-backport-natty |
| ||||||||||
linux-lts-backport-oneiric |
| ||||||||||
linux-mvl-dove |
| ||||||||||
linux-ti-omap4 |
|
Common Weakness Enumeration
References