First published: Fri Sep 07 2007(Updated: )
The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.22 does not properly validate the hop-by-hop IPv6 extended header, which allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a crafted IPv6 packet.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.18-164.10.1.el5 | 0:2.6.18-164.10.1.el5 |
redhat/kernel | <0:2.6.18-92.1.35.el5 | 0:2.6.18-92.1.35.el5 |
redhat/kernel | <0:2.6.18-128.12.1.el5 | 0:2.6.18-128.12.1.el5 |
redhat/rhev-hypervisor | <0:5.4-2.1.8.el5_4 | 0:5.4-2.1.8.el5_4 |
Linux Linux kernel | =2.6.18-rc3 | |
Linux Linux kernel | =2.6.18-rc2 | |
Linux Linux kernel | =2.4.36.6 | |
Linux Linux kernel | =2.6.18-rc5 | |
Linux Linux kernel | =2.6.18-rc4 | |
Linux Linux kernel | =2.6.21.6 | |
Linux Linux kernel | =2.4.36.2 | |
Linux Linux kernel | =2.6.20.16 | |
Linux Linux kernel | =2.6.19.4 | |
Linux Linux kernel | =2.6.20.21 | |
Linux Linux kernel | =2.4.36.1 | |
Linux Linux kernel | =2.6.20.17 | |
Linux Linux kernel | =2.6.21.5 | |
Linux Linux kernel | =2.4.36.4 | |
Linux Linux kernel | =2.6.20.20 | |
Linux Linux kernel | =2.4.36.3 | |
Linux Linux kernel | =2.6.20.18 | |
Linux Linux kernel | =2.6.19.7 | |
Linux Linux kernel | =2.6.20.19 | |
Linux Linux kernel | =2.6.18-rc7 | |
Linux Linux kernel | =2.4.36 | |
Linux Linux kernel | =2.6.19.6 | |
Linux Linux kernel | =2.6.18-rc6 | |
Linux Linux kernel | =2.6.19.5 | |
Linux Linux kernel | =2.6.18 | |
Linux Linux kernel | =2.4.36.5 | |
Linux Linux kernel | =2.2.27 | |
Linux Linux kernel | <=2.6.21.7 | |
Linux Linux kernel | =2.6.18-rc1 | |
Linux Linux kernel | =2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)