CVE-2012-2744

Published: 10 July 2012

net/ipv6/netfilter/nf_conntrack_reasm.c in the Linux kernel before 2.6.34, when the nf_conntrack_ipv6 module is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via certain types of fragmented IPv6 packets.

From the Ubuntu security team

An error was found in the Linux kernel's IPv6 netfilter when connection tracking is enabled. A remote attacker could exploit this flaw to crash a system if it is using IPv6 with the nf_contrack_ipv6 kernel module loaded.

Priority

Medium

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.34~rc1)
Patches:
Vendor: https://rhn.redhat.com/errata/RHSA-2012-1064.html
Introduced by 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed by 9e2dcf72023d1447f09c47d77c99b0c49659e5ce
linux-armadaxp
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.34~rc1)
linux-ec2
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.34~rc1)
linux-fsl-imx51
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.34~rc1)
linux-linaro-omap
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.34~rc1)
linux-linaro-shared
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.34~rc1)
linux-linaro-vexpress
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.34~rc1)
linux-lts-backport-maverick
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.34~rc1)
linux-lts-backport-natty
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.34~rc1)
linux-lts-backport-oneiric
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.34~rc1)
linux-mvl-dove
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.34~rc1)
linux-qcm-msm
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.34~rc1)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.34~rc1)

Notes

AuthorNote
jdstrand
linux-armadaxp is maintained by OEM
commit is from 2010. Ubuntu 10.04 LTS confirmed as not affected
downgrading to 'medium' (and therefore will follow the standard
kernel cadence update process). This is a 2 year old fix that only affects
Ubuntu 8.04 LTS when using IPv6.

References

Bugs