Описание
The nfattr_to_tcp function in ip_conntrack_proto_tcp.c in ctnetlink in Linux kernel 2.6.14 up to 2.6.14.3 allows attackers to cause a denial of service (kernel oops) via an update message without private protocol information, which triggers a null dereference.
Релиз | Статус | Примечание |
---|---|---|
dapper | not-affected | |
devel | DNE | |
edgy | DNE | |
feisty | DNE | |
upstream | needs-triage |
Показывать по
Ссылки на источники
7.8 High
CVSS2
Связанные уязвимости
The nfattr_to_tcp function in ip_conntrack_proto_tcp.c in ctnetlink in Linux kernel 2.6.14 up to 2.6.14.3 allows attackers to cause a denial of service (kernel oops) via an update message without private protocol information, which triggers a null dereference.
The nfattr_to_tcp function in ip_conntrack_proto_tcp.c in ctnetlink in ...
The nfattr_to_tcp function in ip_conntrack_proto_tcp.c in ctnetlink in Linux kernel 2.6.14 up to 2.6.14.3 allows attackers to cause a denial of service (kernel oops) via an update message without private protocol information, which triggers a null dereference.
7.8 High
CVSS2