CVE-2006-4572

Priority
Description
ip6_tables in netfilter in the Linux kernel before 2.6.16.31 allows remote
attackers to (1) bypass a rule that disallows a protocol, via a packet with
the protocol header not located immediately after the fragment header, aka
"ip6_tables protocol bypass bug;" and (2) bypass a rule that looks for a
certain extension header, via a packet with an extension header outside the
first fragment, aka "ip6_tables extension header bypass bug."
Notes
Package
Upstream:needs-triage
Package
Upstream:needs-triage
More Information

Updated: 2019-12-05 20:39:48 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)