Описание
An issue was discovered in the IPv6 protocol specification, related to ICMP Packet Too Big (PTB) messages. (The scope of this CVE is all affected IPv6 implementations from all vendors.) The security implications of IP fragmentation have been discussed at length in [RFC6274] and [RFC7739]. An attacker can leverage the generation of IPv6 atomic fragments to trigger the use of fragmentation in an arbitrary IPv6 flow (in scenarios in which actual fragmentation of packets is not needed) and can subsequently perform any type of fragmentation-based attack against legacy IPv6 nodes that do not implement [RFC6946]. That is, employing fragmentation where not actually needed allows for fragmentation-based attack vectors to be employed, unnecessarily. We note that, unfortunately, even nodes that already implement [RFC6946] can be subject to DoS attacks as a result of the generation of IPv6 atomic fragments. Let us assume that Host A is communicating with Host B and that, as a result of the wide...
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 4.10.0-19.21 |
esm-infra-legacy/trusty | not-affected | 3.13.0-51.84 |
esm-infra/xenial | not-affected | 4.2.0-16.19 |
precise | released | 3.2.0-85.122 |
precise/esm | not-affected | 3.2.0-85.122 |
trusty | released | 3.13.0-51.84 |
trusty/esm | not-affected | 3.13.0-51.84 |
upstream | released | 3.19~rc6 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | not-affected | 3.19.0-7.7 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
precise | released | 3.2.0-1651.71 |
precise/esm | DNE | precise was released [3.2.0-1651.71] |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 3.19~rc6 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | not-affected | 4.4.0-1002.2 |
esm-infra/xenial | not-affected | 4.4.0-1001.10 |
precise | DNE | |
precise/esm | DNE | |
trusty | not-affected | 4.4.0-1002.2 |
trusty/esm | not-affected | 4.4.0-1002.2 |
upstream | released | 3.19~rc6 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-apps/xenial | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored] |
precise | DNE | |
precise/esm | DNE | |
trusty | ignored | |
trusty/esm | DNE | trusty was ignored |
upstream | released | 3.19~rc6 |
vivid/stable-phone-overlay | ignored | end of life |
vivid/ubuntu-core | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
precise | DNE | |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 3.19~rc6 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | not-affected | 4.4.0-1003.3 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-apps/xenial | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored] |
precise | DNE | |
precise/esm | DNE | |
trusty | ignored | |
trusty/esm | DNE | trusty was ignored |
upstream | released | 3.19~rc6 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored] |
precise | DNE | |
precise/esm | DNE | |
trusty | ignored | |
trusty/esm | DNE | trusty was ignored |
upstream | released | 3.19~rc6 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
esm-infra/xenial | not-affected | 4.8.0-36.36~16.04.1 |
precise | DNE | |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 3.19~rc6 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
esm-infra/xenial | not-affected | 4.8.0-36.36~16.04.1 |
precise | DNE | |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 3.19~rc6 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
precise | ignored | end of life |
precise/esm | DNE | precise was ignored [abandoned] |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 3.19~rc6 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
precise | ignored | end of life |
precise/esm | DNE | precise was ignored [abandoned] |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 3.19~rc6 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
precise | ignored | end of life |
precise/esm | DNE | precise was ignored [abandoned] |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 3.19~rc6 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
precise | ignored | end of life |
precise/esm | ignored | end of life, was ignored |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 3.19~rc6 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
precise | ignored | end of life |
precise/esm | ignored | end of life, was ignored |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 3.19~rc6 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
precise | ignored | end of life |
precise/esm | ignored | end of life, was ignored |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 3.19~rc6 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
precise | released | 3.13.0-51.84~precise1 |
precise/esm | not-affected | 3.13.0-51.84~precise1 |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 3.19~rc6 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored [end of standard support]] |
precise | DNE | |
precise/esm | DNE | |
trusty | ignored | end of standard support |
trusty/esm | DNE | trusty was ignored [end of standard support] |
upstream | released | 3.19~rc6 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [3.19.0-18.18~14.04.1]] |
precise | DNE | |
precise/esm | DNE | |
trusty | not-affected | 3.19.0-18.18~14.04.1 |
trusty/esm | DNE | trusty was not-affected [3.19.0-18.18~14.04.1] |
upstream | released | 3.19~rc6 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored [end of standard support]] |
precise | DNE | |
precise/esm | DNE | |
trusty | ignored | end of standard support |
trusty/esm | DNE | trusty was ignored [end of standard support] |
upstream | released | 3.19~rc6 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | not-affected | 4.4.0-13.29~14.04.1 |
precise | DNE | |
precise/esm | DNE | |
trusty | not-affected | 4.4.0-13.29~14.04.1 |
trusty/esm | not-affected | 4.4.0-13.29~14.04.1 |
upstream | released | 3.19~rc6 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored] |
precise | DNE | |
precise/esm | DNE | |
trusty | ignored | |
trusty/esm | DNE | trusty was ignored |
upstream | released | 3.19~rc6 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-apps/xenial | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored] |
precise | DNE | |
precise/esm | DNE | |
trusty | ignored | |
trusty/esm | DNE | trusty was ignored |
upstream | released | 3.19~rc6 |
vivid/stable-phone-overlay | ignored | end of life |
vivid/ubuntu-core | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored] |
precise | DNE | |
precise/esm | DNE | |
trusty | ignored | |
trusty/esm | DNE | trusty was ignored |
upstream | released | 3.19~rc6 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
precise | ignored | end of life |
precise/esm | DNE | precise was ignored [abandoned] |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 3.19~rc6 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 4.10.0-1004.6 |
esm-infra-legacy/trusty | DNE | |
precise | DNE | |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 3.19~rc6 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | ignored | end of life, was needs-triage |
xenial | not-affected | 4.2.0-1013.19 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 4.4.0-1050.54 |
esm-infra-legacy/trusty | DNE | |
precise | DNE | |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 3.19~rc6 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | not-affected | 4.4.0-1012.12 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
precise | released | 3.2.0-1465.85 |
precise/esm | DNE | precise was released [3.2.0-1465.85] |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 3.19~rc6 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Ссылки на источники
EPSS
5 Medium
CVSS2
8.6 High
CVSS3
Связанные уязвимости
An issue was discovered in the IPv6 protocol specification, related to ICMP Packet Too Big (PTB) messages. (The scope of this CVE is all affected IPv6 implementations from all vendors.) The security implications of IP fragmentation have been discussed at length in [RFC6274] and [RFC7739]. An attacker can leverage the generation of IPv6 atomic fragments to trigger the use of fragmentation in an arbitrary IPv6 flow (in scenarios in which actual fragmentation of packets is not needed) and can subsequently perform any type of fragmentation-based attack against legacy IPv6 nodes that do not implement [RFC6946]. That is, employing fragmentation where not actually needed allows for fragmentation-based attack vectors to be employed, unnecessarily. We note that, unfortunately, even nodes that already implement [RFC6946] can be subject to DoS attacks as a result of the generation of IPv6 atomic fragments. Let us assume that Host A is communicating with Host B and that, as a result of the wide...
An issue was discovered in the IPv6 protocol specification, related to ICMP Packet Too Big (PTB) messages. (The scope of this CVE is all affected IPv6 implementations from all vendors.) The security implications of IP fragmentation have been discussed at length in [RFC6274] and [RFC7739]. An attacker can leverage the generation of IPv6 atomic fragments to trigger the use of fragmentation in an arbitrary IPv6 flow (in scenarios in which actual fragmentation of packets is not needed) and can subsequently perform any type of fragmentation-based attack against legacy IPv6 nodes that do not implement [RFC6946]. That is, employing fragmentation where not actually needed allows for fragmentation-based attack vectors to be employed, unnecessarily. We note that, unfortunately, even nodes that already implement [RFC6946] can be subject to DoS attacks as a result of the generation of IPv6 atomic fragments. Let us assume that Host A is communicating with Host B and that, as a result of the widespr
An issue was discovered in the IPv6 protocol specification, related to ...
An issue was discovered in the IPv6 protocol specification, related to ICMP Packet Too Big (PTB) messages. (The scope of this CVE is all affected IPv6 implementations from all vendors.) The security implications of IP fragmentation have been discussed at length in [RFC6274] and [RFC7739]. An attacker can leverage the generation of IPv6 atomic fragments to trigger the use of fragmentation in an arbitrary IPv6 flow (in scenarios in which actual fragmentation of packets is not needed) and can subsequently perform any type of fragmentation-based attack against legacy IPv6 nodes that do not implement [RFC6946]. That is, employing fragmentation where not actually needed allows for fragmentation-based attack vectors to be employed, unnecessarily. We note that, unfortunately, even nodes that already implement [RFC6946] can be subject to DoS attacks as a result of the generation of IPv6 atomic fragments. Let us assume that Host A is communicating with Host B and that, as a result of the wide...
ELSA-2017-0817: kernel security, bug fix, and enhancement update (MODERATE)
EPSS
5 Medium
CVSS2
8.6 High
CVSS3