summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2007-4567
blob: d345051a916ea961e9b6dacb637e12a28f1e92e4 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Candidate: CVE-2007-4567
References: 
 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=e76b2b2567b83448c2ee85a896433b96150c92e6
 http://bugzilla.kernel.org/show_bug.cgi?id=8450
Description: 
Ubuntu-Description: 
 Eric Sesterhenn and Victor Julien discovered that the hop-by-hop IPv6
 extended header was not correctly validated.  If a system was configured
 for IPv6, a remote attacker could send a specially crafted IPv6 packet
 and cause the kernel to panic, leading to a denial of service.  This
 was only vulnerable in Ubuntu 7.04.
Notes: 
 kees> introduced in 2.6.20, fixed in 2.6.22
Bugs: 
upstream: released (2.6.22)
linux-2.6: released (2.6.22-1)
2.6.18-etch-security: N/A
2.6.8-sarge-security: N/A
2.4.27-sarge-security: N/A
2.6.15-dapper-security: N/A
2.6.17-edgy-security: N/A
2.6.20-feisty-security: released (2.6.20-2.6.20-16.33)
2.6.22-gutsy-security: N/A

© 2014-2024 Faster IT GmbH | imprint | privacy policy