CVE-2017-2634 REJECTED

It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation before 2.6.22.17 used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system.

EPSS 3.66% · 87.8th percentile

Risk Scores

EPSS Score
3.66%
87.8th percentile

Affected Products

VendorProductVersions
Ubuntu:14.04:LTSlinux-lts-vivid0
Ubuntu:16.04:LTSlinux-hwe0
Ubuntu:16.04:LTSlinux-raspi20
Ubuntu:16.04:LTSlinux-aws0
Ubuntu:16.04:LTSlinux-snapdragon0
Ubuntu:14.04:LTSlinux-lts-xenial0
Ubuntu:14.04:LTSlinux-aws0
Ubuntu:16.04:LTSlinux-gke0
Ubuntu:16.04:LTSlinux-goldfish0, 3.4.0-4.24, 3.4.0-4.26
Ubuntu:16.04:LTSlinux0
Ubuntu:16.04:LTSlinux-flo3.4.0-5.19, 0
Ubuntu:14.04:LTSlinux0
Ubuntu:16.04:LTSlinux-mako3.4.0-7.39, 0

Timeline

References

Open in Interactive Console →