blob: d345051a916ea961e9b6dacb637e12a28f1e92e4 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
|
Candidate: CVE-2007-4567
References:
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=e76b2b2567b83448c2ee85a896433b96150c92e6
http://bugzilla.kernel.org/show_bug.cgi?id=8450
Description:
Ubuntu-Description:
Eric Sesterhenn and Victor Julien discovered that the hop-by-hop IPv6
extended header was not correctly validated. If a system was configured
for IPv6, a remote attacker could send a specially crafted IPv6 packet
and cause the kernel to panic, leading to a denial of service. This
was only vulnerable in Ubuntu 7.04.
Notes:
kees> introduced in 2.6.20, fixed in 2.6.22
Bugs:
upstream: released (2.6.22)
linux-2.6: released (2.6.22-1)
2.6.18-etch-security: N/A
2.6.8-sarge-security: N/A
2.4.27-sarge-security: N/A
2.6.15-dapper-security: N/A
2.6.17-edgy-security: N/A
2.6.20-feisty-security: released (2.6.20-2.6.20-16.33)
2.6.22-gutsy-security: N/A
|