First published: Mon Nov 21 2011(Updated: )
A bug was found in the way headroom check was performed in udp6_ufo_fragment() function. A remote attacker could use this flaw to crash the system. Upstream patch: a9cf73ea7ff78f52662c8658d93c226effbbedde
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux kernel | <2.6.39 | |
All of | ||
Avaya 96x1 IP Deskphone | >=6.0.0<=6.6.0 | |
Avaya 96x1 IP Deskphone | ||
Avaya 96x1 IP Deskphone | >=6.0.0<=6.6.0 | |
Avaya 96x1 IP Deskphone |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4326 has a critical severity as it can lead to a system crash from remote exploitation.
To fix CVE-2011-4326, apply the upstream patch a9cf73ea7ff78f52662c8658d93c226effbbedde.
CVE-2011-4326 affects the Linux kernel versions up to 2.6.39.
Yes, CVE-2011-4326 impacts Avaya 96x1 IP Deskphones with firmware versions between 6.0.0 and 6.6.0.
CVE-2011-4326 exploits a bug in the headroom check within the udp6_ufo_fragment() function.