summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2007-4567
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2007-12-27 17:53:11 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2007-12-27 17:53:11 +0000
commitd052a515db3cd6276860899434b4c531e8ce81a5 (patch)
treebafa28f0fddf7b842298d63eb3a1fa4965674a29 /retired/CVE-2007-4567
parentbc0c46734cfa50b53d558381ba20e8387e6685e8 (diff)
retire two issues
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1074 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2007-4567')
-rw-r--r--retired/CVE-2007-456723
1 files changed, 23 insertions, 0 deletions
diff --git a/retired/CVE-2007-4567 b/retired/CVE-2007-4567
new file mode 100644
index 00000000..d345051a
--- /dev/null
+++ b/retired/CVE-2007-4567
@@ -0,0 +1,23 @@
+Candidate: CVE-2007-4567
+References:
+ http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=e76b2b2567b83448c2ee85a896433b96150c92e6
+ http://bugzilla.kernel.org/show_bug.cgi?id=8450
+Description:
+Ubuntu-Description:
+ Eric Sesterhenn and Victor Julien discovered that the hop-by-hop IPv6
+ extended header was not correctly validated. If a system was configured
+ for IPv6, a remote attacker could send a specially crafted IPv6 packet
+ and cause the kernel to panic, leading to a denial of service. This
+ was only vulnerable in Ubuntu 7.04.
+Notes:
+ kees> introduced in 2.6.20, fixed in 2.6.22
+Bugs:
+upstream: released (2.6.22)
+linux-2.6: released (2.6.22-1)
+2.6.18-etch-security: N/A
+2.6.8-sarge-security: N/A
+2.4.27-sarge-security: N/A
+2.6.15-dapper-security: N/A
+2.6.17-edgy-security: N/A
+2.6.20-feisty-security: released (2.6.20-2.6.20-16.33)
+2.6.22-gutsy-security: N/A

© 2014-2024 Faster IT GmbH | imprint | privacy policy