It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation before 2.6.22.17 used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system.
2018-07-27T19:29:00.580
2024-11-21T03:23:52.553
Modified
CVSSv3.0: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:N/I:N/A:C
10.0
6.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | linux | linux_kernel | < 2.6.22.17 | Yes |
Operating System | redhat | enterprise_linux_desktop | 5.0 | Yes |
Operating System | redhat | enterprise_linux_server | 5.0 | Yes |
Operating System | redhat | enterprise_linux_server_aus | 5.6 | Yes |
Operating System | redhat | enterprise_linux_server_aus | 5.9 | Yes |
Operating System | redhat | enterprise_linux_workstation | 5.0 | Yes |