Candidate: CVE-2007-4567 References: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=e76b2b2567b83448c2ee85a896433b96150c92e6 http://bugzilla.kernel.org/show_bug.cgi?id=8450 Description: Ubuntu-Description: Eric Sesterhenn and Victor Julien discovered that the hop-by-hop IPv6 extended header was not correctly validated. If a system was configured for IPv6, a remote attacker could send a specially crafted IPv6 packet and cause the kernel to panic, leading to a denial of service. This was only vulnerable in Ubuntu 7.04. Notes: kees> introduced in 2.6.20, fixed in 2.6.22 Bugs: upstream: released (2.6.22) linux-2.6: released (2.6.22-1) 2.6.18-etch-security: N/A 2.6.8-sarge-security: N/A 2.4.27-sarge-security: N/A 2.6.15-dapper-security: N/A 2.6.17-edgy-security: N/A 2.6.20-feisty-security: released (2.6.20-2.6.20-16.33) 2.6.22-gutsy-security: N/A