CVE-2009-1298
08.12.2009, 23:30
The ip_frag_reasm function in net/ipv4/ip_fragment.c in the Linux kernel 2.6.32-rc8, and 2.6.29 and later versions before 2.6.32, calls IP_INC_STATS_BH with an incorrect argument, which allows remote attackers to cause a denial of service (NULL pointer dereference and hang) via long IP packets, possibly related to the ip_defrag function.Enginsight
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 𝑥 ≤ 2.6.32 |
linux | linux_kernel | 2.6.28 |
linux | linux_kernel | 2.6.28:rc1 |
linux | linux_kernel | 2.6.28:rc2 |
linux | linux_kernel | 2.6.28:rc3 |
linux | linux_kernel | 2.6.28:rc4 |
linux | linux_kernel | 2.6.28:rc5 |
linux | linux_kernel | 2.6.28:rc6 |
linux | linux_kernel | 2.6.28:rc7 |
linux | linux_kernel | 2.6.28.1 |
linux | linux_kernel | 2.6.28.2 |
linux | linux_kernel | 2.6.28.3 |
linux | linux_kernel | 2.6.28.4 |
linux | linux_kernel | 2.6.28.5 |
linux | linux_kernel | 2.6.28.6 |
linux | linux_kernel | 2.6.28.7 |
linux | linux_kernel | 2.6.28.8 |
linux | linux_kernel | 2.6.28.9 |
linux | linux_kernel | 2.6.28.10 |
linux | linux_kernel | 2.6.29 |
linux | linux_kernel | 2.6.29:rc2 |
linux | linux_kernel | 2.6.29:rc2_git7 |
linux | linux_kernel | 2.6.29:rc8-kk |
linux | linux_kernel | 2.6.29.1 |
linux | linux_kernel | 2.6.29.2 |
linux | linux_kernel | 2.6.29.3 |
linux | linux_kernel | 2.6.29.4 |
linux | linux_kernel | 2.6.29.5 |
linux | linux_kernel | 2.6.29.6 |
linux | linux_kernel | 2.6.30 |
linux | linux_kernel | 2.6.30:rc1 |
linux | linux_kernel | 2.6.30:rc2 |
linux | linux_kernel | 2.6.30:rc3 |
linux | linux_kernel | 2.6.30:rc4 |
linux | linux_kernel | 2.6.30:rc5 |
linux | linux_kernel | 2.6.30:rc6 |
linux | linux_kernel | 2.6.30:rc7-git6 |
linux | linux_kernel | 2.6.30.1 |
linux | linux_kernel | 2.6.30.2 |
linux | linux_kernel | 2.6.30.3 |
linux | linux_kernel | 2.6.30.4 |
linux | linux_kernel | 2.6.30.5 |
linux | linux_kernel | 2.6.30.6 |
linux | linux_kernel | 2.6.30.7 |
linux | linux_kernel | 2.6.30.8 |
linux | linux_kernel | 2.6.30.9 |
linux | linux_kernel | 2.6.31 |
linux | linux_kernel | 2.6.31:rc1 |
linux | linux_kernel | 2.6.31:rc2 |
linux | linux_kernel | 2.6.31:rc3 |
linux | linux_kernel | 2.6.31:rc4 |
linux | linux_kernel | 2.6.31:rc5 |
linux | linux_kernel | 2.6.31:rc6 |
linux | linux_kernel | 2.6.31:rc7 |
linux | linux_kernel | 2.6.31:rc8 |
linux | linux_kernel | 2.6.31.1 |
linux | linux_kernel | 2.6.31.2 |
linux | linux_kernel | 2.6.31.3 |
linux | linux_kernel | 2.6.31.4 |
linux | linux_kernel | 2.6.31.5 |
linux | linux_kernel | 2.6.31.6 |
linux | linux_kernel | 2.6.32 |
linux | linux_kernel | 2.6.32:rc1 |
linux | linux_kernel | 2.6.32:rc3 |
linux | linux_kernel | 2.6.32:rc4 |
linux | linux_kernel | 2.6.32:rc5 |
linux | linux_kernel | 2.6.32:rc6 |
linux | linux_kernel | 2.6.32:rc7 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References