-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Reference: CERT-EU Security Advisory 2012-0094
 
Title: Linux kernel netfilter: null pointer dereference in nf_ct_frag6_reasm() [1]
 
Version history:
09.08.2012 Initial publication

Summary
=======
The Linux kernel is prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to 
cause a kernel crash, denying service to legitimate users. [2]


CVE-2012-2744
CVSS v2 Base Score:7.8 (MEDIUM) (AV:N/AC:L/Au:N/C:N/I:N/A:C) [1,3]
Base Metrics:  

Vulnerable systems
==================
Linux kernel - see references

Original Details
================
A NULL pointer dereference flaw was found in the nf_ct_frag6_reasm()function in the Linux kernel's 
netfilter IPv6 connection tracking implementation. A remote attacker could use this flaw to end
specially-crafted packets to a target system that is using IPv6 and also has the nf_conntrack_ipv6 kernel 
module loaded, causing it to crash. [4]

What can you do?
================
Fix is available from different vendors 

What to tell your users?
========================
N/A

More information
================
[1] https://access.redhat.com/security/cve/CVE-2012-2744
[2] http://www.securityfocus.com/bid/54367/info
[3] Information about CVSS: http://www.first.org/cvss/cvss-guide.html
[4] http://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-2744.html

Best regards,

CERT-EU Pre-configuration Team (http://cert.europa.eu)
Phone: +32.2.2990005 / e-mail: cert-eu@ec.europa.eu
PGP KeyID 0x46AC4383
FP: 9011 6BE9 D642 DD93 8348 DAFA 27A4 06CA 46AC 4383
Privacy Statement: http://cert.europa.eu/cert/plainedition/en/cert_privacy.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
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=sNKA
-----END PGP SIGNATURE-----