CVE-2012-2744
Publication date 10 July 2012
Last updated 24 July 2024
Ubuntu priority
net/ipv6/netfilter/nf_conntrack_reasm.c in the Linux kernel before 2.6.34, when the nf_conntrack_ipv6 module is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via certain types of fragmented IPv6 packets.
From the Ubuntu Security Team
An error was found in the Linux kernel's IPv6 netfilter when connection tracking is enabled. A remote attacker could exploit this flaw to crash a system if it is using IPv6 with the nf_contrack_ipv6 kernel module loaded.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | ||
linux-armadaxp | ||
linux-ec2 | ||
linux-fsl-imx51 | ||
linux-linaro-omap | ||
linux-linaro-shared | ||
linux-linaro-vexpress | ||
linux-lts-backport-maverick | ||
linux-lts-backport-natty | ||
linux-lts-backport-oneiric | ||
linux-mvl-dove | ||
linux-qcm-msm | ||
linux-ti-omap4 | ||
Notes
jdstrand
linux-armadaxp is maintained by OEM commit is from 2010. Ubuntu 10.04 LTS confirmed as not affected downgrading to 'medium' (and therefore will follow the standard kernel cadence update process). This is a 2 year old fix that only affects Ubuntu 8.04 LTS when using IPv6.
Patch details
Package | Patch details |
---|---|
linux |
|
References
Related Ubuntu Security Notices (USN)
- USN-1507-1
- Linux kernel vulnerabilities
- 17 July 2012