First published: Thu Nov 15 2007(Updated: )
The tcp_sacktag_write_queue function in net/ipv4/tcp_input.c in Linux kernel 2.6.21 through 2.6.23.7, and 2.6.24-rc through 2.6.24-rc2, allows remote attackers to cause a denial of service (crash) via crafted ACK responses that trigger a NULL pointer dereference.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | =2.6.21-rc2 | |
Linux Kernel | =2.6.23.4 | |
Linux Kernel | =2.6.22.15 | |
Linux Kernel | =2.6.21 | |
Linux Kernel | =2.6.22-rc4 | |
Linux Kernel | =2.6.22-rc2 | |
Linux Kernel | =2.6.21-rc5 | |
Linux Kernel | =2.6.22.4 | |
Linux Kernel | =2.6.21-rc7 | |
Linux Kernel | =2.6.21-rc4 | |
Linux Kernel | =2.6.22.21 | |
Linux Kernel | =2.6.23.7 | |
Linux Kernel | =2.6.22.12 | |
Linux Kernel | =2.6.21.6 | |
Linux Kernel | =2.6.22.1 | |
Linux Kernel | =2.6.22 | |
Linux Kernel | =2.6.23.1 | |
Linux Kernel | =2.6.23-rc4 | |
Linux Kernel | =2.6.21.1 | |
Linux Kernel | =2.6.21.4 | |
Linux Kernel | =2.6.23-rc3 | |
Linux Kernel | =2.6.21.5 | |
Linux Kernel | =2.6.22.7 | |
Linux Kernel | =2.6.23-rc8 | |
Linux Kernel | =2.6.24-rc1 | |
Linux Kernel | =2.6.22-rc5 | |
Linux Kernel | =2.6.21-rc6 | |
Linux Kernel | =2.6.22.18 | |
Linux Kernel | =2.6.22.20 | |
Linux Kernel | =2.6.23-rc2 | |
Linux Kernel | =2.6.22.6 | |
Linux Kernel | =2.6.23.3 | |
Linux Kernel | =2.6.22.3 | |
Linux Kernel | =2.6.23-rc6 | |
Linux Kernel | =2.6.23-rc1 | |
Linux Kernel | =2.6.22.9 | |
Linux Kernel | =2.6.22-rc3 | |
Linux Kernel | =2.6.22.13 | |
Linux Kernel | =2.6.23-rc7 | |
Linux Kernel | =2.6.21.3 | |
Linux Kernel | =2.6.22.17 | |
Linux Kernel | =2.6.21-rc1 | |
Linux Kernel | =2.6.22-rc1 | |
Linux Kernel | =2.6.22.11 | |
Linux Kernel | =2.6.23 | |
Linux Kernel | =2.6.22.10 | |
Linux Kernel | =2.6.23.2 | |
Linux Kernel | =2.6.21.7 | |
Linux Kernel | =2.6.21.2 | |
Linux Kernel | =2.6.24-rc2 | |
Linux Kernel | =2.6.23-rc9 | |
Linux Kernel | =2.6.22.22 | |
Linux Kernel | =2.6.22-rc7 | |
Linux Kernel | =2.6.23.5 | |
Linux Kernel | =2.6.22.8 | |
Linux Kernel | =2.6.23.6 | |
Linux Kernel | =2.6.22-rc6 | |
Linux Kernel | =2.6.22.2 | |
Linux Kernel | =2.6.22.19 | |
Linux Kernel | =2.6.22.5 | |
Linux Kernel | =2.6.21-rc3 | |
Linux Kernel | =2.6.23-rc5 | |
Linux Kernel | =2.6.22.16 | |
Linux Kernel | =2.6.22.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5501 has a severity rating that indicates it can cause denial of service by crashing the affected system.
CVE-2007-5501 affects Linux kernel versions 2.6.21 through 2.6.23.7 and includes specific release candidates within that range.
To mitigate CVE-2007-5501, you should upgrade to a patched version of the Linux kernel that addresses this vulnerability.
CVE-2007-5501 can facilitate a denial of service attack through crafted ACK responses that lead to a NULL pointer dereference.
Yes, CVE-2007-5501 is known to be exploitable remotely, leading to potential system crashes.