First published: Mon Nov 16 2015(Updated: )
A vulnerability in net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0, where the MTU value was not validated, was found. This allowed context-dependent attackers to cause a denial of service (packet loss) via a value that is either smaller than the minimum compliant value or larger than the MTU of an interface. Upstream patch: <a href="https://github.com/torvalds/linux/commit/77751427a1ff25b27d47a4c36b12c3c8667855ac">https://github.com/torvalds/linux/commit/77751427a1ff25b27d47a4c36b12c3c8667855ac</a>
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=3.19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.