Description
net/ipv6/tcp_ipv6.c in Linux kernel 2.6.x up to 2.6.21-rc3 inadvertently copies the ipv6_fl_socklist from a listening TCP socket to child sockets, which allows local users to cause a denial of service (OOPS) or double free by opening a listening IPv6 socket, attaching a flow label, and connecting to that socket.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1286-1 | New Linux 2.6.18 packages fix several vulnerabilities |
Debian DSA |
DSA-1304-1 | New Linux kernel 2.6.8 packages fix several vulnerabilities |
Debian DSA |
DSA-1503-1 | New Linux kernel 2.4.27 packages fix several issues |
Debian DSA |
DSA-1503-2 | New Linux kernel 2.4.27 packages fix several issues |
EUVD |
EUVD-2007-1586 | net/ipv6/tcp_ipv6.c in Linux kernel 2.6.x up to 2.6.21-rc3 inadvertently copies the ipv6_fl_socklist from a listening TCP socket to child sockets, which allows local users to cause a denial of service (OOPS) or double free by opening a listening IPv6 socket, attaching a flow label, and connecting to that socket. |
Ubuntu USN |
USN-464-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T12:59:08.976Z
Reserved: 2007-03-22T00:00:00.000Z
Link: CVE-2007-1592
No data.
Status : Modified
Published: 2007-03-22T19:19:00.000
Modified: 2026-04-23T00:35:47.467
Link: CVE-2007-1592
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN