[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#420875: marked as done (Linux Kernel NULL Pointer Dereferences and Security Bypass)



Your message dated Mon, 30 Apr 2007 19:25:52 -0600
with message-id <20070501012552.GA2291@colo>
and subject line fixed in 2.6.20-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: linux-image
Severity: critical
Tags: security

According to debsecan and current CVEs is Debian vulnerable to
CVE-2007-1734. Because this is remote exploitable i set the priority of
this bug report to critical.

Description of this security issue:

nf_conntrack in netfilter in the Linux kernel before 2.6.20.3 does not
set nfctinfo during reassembly of fragmented packets, which leaves the
default value as IP_CT_ESTABLISHED and might allow remote attackers to
bypass certain rulesets using IPv6 fragments.

This security issue is considered one with high severity.
Security team gets CC.

Best Regards

Patrick

Attachment: signature.asc
Description: OpenPGP digital signature


--- End Message ---
--- Begin Message ---
Version: 2.6.20-1

CVE-2007-1734 was fixed in 2.6.20.5 which was included in
2.6.20-1.

CVE-2007-1497 was fixed in 2.6.20.3, also included in 2.6.20-1.

-- 
dann frazier


--- End Message ---

Reply to: