Linux Kernel netfilter Fragmented IPv6 Packet Filtering Bypass

2006-10-24T16:09:32
ID OSVDB:30066
Type osvdb
Reporter OSVDB
Modified 2006-10-24T16:09:32

Description

No description provided by the source

References:

Vendor Specific News/Changelog Entry: http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=51d8b1a65291a6956b79374b6adbbadc2263bcf6 Vendor Specific News/Changelog Entry: http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6d381634d213580d40d431e7664dfb45f641b884 Vendor Specific Advisory URL Secunia Advisory ID:23384 Secunia Advisory ID:22731 Secunia Advisory ID:22762 Secunia Advisory ID:24098 Secunia Advisory ID:25691 Secunia Advisory ID:23474 Other Advisory URL: http://lists.suse.com/archive/suse-security-announce/2006-Dec/0009.html Other Advisory URL: https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-February/000483.html Other Advisory URL: http://www.ubuntu.com/usn/usn-395-1 Other Advisory URL: http://lists.rpath.com/pipermail/security-announce/2007-June/000200.html Mail List Post: http://readlist.com/lists/vger.kernel.org/linux-kernel/55/275979.html Keyword: "ip6_tables protocol bypass bug" Keyword: "ip6_tables extension header bypass bug" CVE-2006-4572