The __inet6_check_established function in net/ipv6/inet6_hashtables.c in the Linux kernel before 2.6.29, when Network Namespace Support (aka NET_NS) is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via vectors involving IPv6 packets.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
The __inet6_check_established function in net/ipv6/inet6_hashtables.c in the Linux kernel before 2.6.29, when Network Namespace Support (aka NET_NS) is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via vectors involving IPv6 packets.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.mandriva.com/security/advisories?name=MDVSA-2009:135 | vendor-advisory x_refsource_MANDRIVA |
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00002.html | vendor-advisory x_refsource_SUSE |
http://secunia.com/advisories/35656 | third-party-advisory x_refsource_SECUNIA |
http://www.securityfocus.com/bid/34602 | vdb-entry x_refsource_BID |
http://www.ubuntu.com/usn/usn-793-1 | vendor-advisory x_refsource_UBUNTU |
http://xorl.wordpress.com/2009/04/21/linux-kernel-net_ns-ipv6-null-pointer-dereference/ | x_refsource_MISC |
http://secunia.com/advisories/35387 | third-party-advisory x_refsource_SECUNIA |
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29 | x_refsource_CONFIRM |
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3f53a38131a4e7a053c0aa060aba0411242fb6b9 | x_refsource_CONFIRM |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.mandriva.com/security/advisories?name=MDVSA-2009:135 | vendor-advisory x_refsource_MANDRIVA x_transferred |
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00002.html | vendor-advisory x_refsource_SUSE x_transferred |
http://secunia.com/advisories/35656 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.securityfocus.com/bid/34602 | vdb-entry x_refsource_BID x_transferred |
http://www.ubuntu.com/usn/usn-793-1 | vendor-advisory x_refsource_UBUNTU x_transferred |
http://xorl.wordpress.com/2009/04/21/linux-kernel-net_ns-ipv6-null-pointer-dereference/ | x_refsource_MISC x_transferred |
http://secunia.com/advisories/35387 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29 | x_refsource_CONFIRM x_transferred |
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3f53a38131a4e7a053c0aa060aba0411242fb6b9 | x_refsource_CONFIRM x_transferred |
The __inet6_check_established function in net/ipv6/inet6_hashtables.c in the Linux kernel before 2.6.29, when Network Namespace Support (aka NET_NS) is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via vectors involving IPv6 packets.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 7.1 | HIGH | AV:N/AC:M/Au:N/C:N/I:N/A:C |
CWE ID | Type | Source |
---|---|---|
NVD-CWE-Other | Primary | nvd@nist.gov |
Not vulnerable. This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, 5, or Red Hat Enterprise MRG.
Hyperlink | Source | Resource |
---|---|---|
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3f53a38131a4e7a053c0aa060aba0411242fb6b9 | cve@mitre.org | N/A |
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00002.html | cve@mitre.org | N/A |
http://secunia.com/advisories/35387 | cve@mitre.org | N/A |
http://secunia.com/advisories/35656 | cve@mitre.org | N/A |
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29 | cve@mitre.org | Patch Vendor Advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2009:135 | cve@mitre.org | N/A |
http://www.securityfocus.com/bid/34602 | cve@mitre.org | N/A |
http://www.ubuntu.com/usn/usn-793-1 | cve@mitre.org | N/A |
http://xorl.wordpress.com/2009/04/21/linux-kernel-net_ns-ipv6-null-pointer-dereference/ | cve@mitre.org | Exploit |