First published: Fri Jul 27 2018(Updated: )
It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation before 2.6.22.17 used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <2.6.22.17 | |
Redhat Enterprise Linux Desktop | =5.0 | |
Redhat Enterprise Linux Server | =5.0 | |
Redhat Enterprise Linux Server Aus | =5.6 | |
Redhat Enterprise Linux Server Aus | =5.9 | |
Redhat Enterprise Linux Workstation | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.