blob: 986a907868503e46c4b3c93fa936dbe597688469 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
|
Candidate: CVE-2007-4567
References:
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=e76b2b2567b83448c2ee85a896433b96150c92e6
http://bugzilla.kernel.org/show_bug.cgi?id=8450
Description:
Ubuntu-Description:
Eric Sesterhenn and Victor Julien discovered that the hop-by-hop IPv6
extended header was not correctly validated. If a system was configured
for IPv6, a remote attacker could send a specially crafted IPv6 packet
and cause the kernel to panic, leading to a denial of service. This
was only vulnerable in Ubuntu 7.04.
Notes:
kees> introduced in 2.6.20, fixed in 2.6.22
Bugs:
upstream: pending (2.6.22.5)
linux-2.6:
2.6.18-etch-security: N/A
2.6.8-sarge-security: N/A
2.4.27-sarge-security: N/A
2.6.15-dapper-security: N/A
2.6.17-edgy-security: N/A
2.6.20-feisty-security: released (2.6.20-2.6.20-16.33)
2.6.22-gutsy-security: N/A
|