Candidate: CVE-2007-2242 References: http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.20.y.git;a=commit;h=010831ab8436dfd9304b203467566fb6b135c24f http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.20.y.git;a=commit;h=9d08f139275450f9366d85ba09b9a2e09bb33766 Description: The IPv6 protocol allows remote attackers to cause a denial of service via crafted IPv6 type 0 route headers (IPV6_RTHDR_TYPE_0) that create network amplification between two routers. Ubuntu-Description: A flaw was discovered in the IPv6 stack's handling of type 0 route headers. By sending a specially crafted IPv6 packet, a remote attacker could cause a denial of service between two IPv6 hosts. Notes: dannf> Some info from Vlad Yasevich: dannf: is someone including commits 010831ab8436dfd9304b203467566fb6b135c24f and 9d08f139275450f9366d85ba09b9a2e09bb33766 (IPv6 routing header changes) in the debian kernel? ... vlad: right, but (010831ab8436dfd9304b203467566fb6b135c24f) is security, so it'll be included in etch if necessary s/necessary/affected/ dannf: you need the second one I listed as well, since the first one has a bug in it. vlad: oh, ok - thx dannf: although for the purposes of 2.6.18, the second one might be a no-op and the first one might need to be modified a bit. Bugs: 421595 upstream: linux-2.6: 2.6.18-etch-security: pending (2.6.18.dfsg.1-12etch2) [bugfix/ipv6-disallow-RH0-by-default.patch] 2.6.8-sarge-security: 2.4.27-sarge-security: 2.6.15-dapper-security: needed 2.6.17-edgy-security: needed 2.6.20-feisty-security: published (linux-source-2.6.20-16.28)