The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 02:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6fd99094de2b83d1d4c8457f2c83483b2828e75a - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155804.html - Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155854.html - Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155908.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1221.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1534.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1564.html - Third Party Advisory | |
References | () http://www.debian.org/security/2015/dsa-3237 - Third Party Advisory | |
References | () http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.19.6 - Exploit, Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2015/04/04/2 - Exploit | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html - Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/74315 - | |
References | () http://www.securitytracker.com/id/1032417 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1203712 - Issue Tracking | |
References | () https://github.com/torvalds/linux/commit/6fd99094de2b83d1d4c8457f2c83483b2828e75a - |
07 Nov 2023, 02:25
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2015-05-27 10:59
Updated : 2024-11-21 02:28
NVD link : CVE-2015-2922
Mitre link : CVE-2015-2922
CVE.ORG link : CVE-2015-2922
JSON object : View
Products Affected
debian
- debian_linux
redhat
- enterprise_mrg
linux
- linux_kernel
oracle
- solaris
- linux
fedoraproject
- fedora
CWE
CWE-17
DEPRECATED: Code