Description
The tcp_sacktag_write_queue function in net/ipv4/tcp_input.c in Linux kernel 2.6.21 through 2.6.23.7, and 2.6.24-rc through 2.6.24-rc2, allows remote attackers to cause a denial of service (crash) via crafted ACK responses that trigger a NULL pointer dereference.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2007-5476 | The tcp_sacktag_write_queue function in net/ipv4/tcp_input.c in Linux kernel 2.6.21 through 2.6.23.7, and 2.6.24-rc through 2.6.24-rc2, allows remote attackers to cause a denial of service (crash) via crafted ACK responses that trigger a NULL pointer dereference. |
Ubuntu USN |
USN-558-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-574-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T15:31:58.801Z
Reserved: 2007-10-17T00:00:00.000Z
Link: CVE-2007-5501
No data.
Status : Modified
Published: 2007-11-15T20:46:00.000
Modified: 2026-04-23T00:35:47.467
Link: CVE-2007-5501
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN