CVE-2012-4444
Publication date 9 November 2012
Last updated 24 July 2024
Ubuntu priority
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
From the Ubuntu Security Team
Zhang Zuotao discovered a bug in the Linux kernel's handling of overlapping fragments in ipv6. A remote attacker could exploit this flaw to bypass firewalls and initial new network connections that should have been blocked by the firewall.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | ||
linux-armadaxp | ||
linux-ec2 | ||
linux-fsl-imx51 | ||
linux-linaro-omap | ||
linux-linaro-shared | ||
linux-linaro-vexpress | ||
linux-lts-backport-maverick | ||
linux-lts-backport-oneiric | ||
linux-lts-quantal | ||
linux-lts-raring | ||
linux-mvl-dove | ||
linux-qcm-msm | ||
linux-ti-omap4 | ||
References
Related Ubuntu Security Notices (USN)
- USN-1661-1
- Linux kernel vulnerability
- 11 December 2012
- USN-1664-1
- Linux kernel (EC2) vulnerability
- 13 December 2012
- USN-1660-1
- Linux kernel vulnerability
- 11 December 2012