The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel prior to 2.6.22 does not properly validate the hop-by-hop IPv6 extended header, which allows remote malicious users to cause a denial of service (NULL pointer dereference and kernel panic) via a crafted IPv6 packet.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
linux linux kernel 2.6.18 |
||
linux linux kernel 2.4.36.6 |
||
linux linux kernel 2.6.21.6 |
||
linux linux kernel 2.4.36.2 |
||
linux linux kernel 2.6.20.16 |
||
linux linux kernel 2.6.19.4 |
||
linux linux kernel 2.6.20.21 |
||
linux linux kernel 2.4.36.1 |
||
linux linux kernel 2.6.20.17 |
||
linux linux kernel 2.6.21.5 |
||
linux linux kernel 2.4.36.4 |
||
linux linux kernel 2.6.20.20 |
||
linux linux kernel 2.4.36.3 |
||
linux linux kernel 2.6.20.18 |
||
linux linux kernel 2.6.19.7 |
||
linux linux kernel 2.6.20.19 |
||
linux linux kernel 2.4.36 |
||
linux linux kernel 2.6.19.6 |
||
linux linux kernel 2.6.19.5 |
||
linux linux kernel 2.4.36.5 |
||
linux linux kernel 2.2.27 |
||
linux linux kernel |
||
linux linux kernel 2.6 |