Bug 233262 - ipv6 OOPS triggerable by any user
ipv6 OOPS triggerable by any user
Product: Red Hat Enterprise Linux 3
Classification: Red Hat
Component: kernel (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Neil Horman
Martin Jenner
: 233479 (view as bug list)
Depends On:
  Show dependency treegraph
Reported: 2007-03-21 08:22 EDT by Neil Horman
Modified: 2007-11-30 17:07 EST (History)
4 users (show)

See Also:
Fixed In Version: RHSA-2007-0436
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2007-06-11 14:00:11 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)
RHEL3 version of the RHEL5 patch (349 bytes, patch)
2007-03-21 08:22 EDT, Neil Horman
no flags Details | Diff

  None (edit)
Comment 1 Neil Horman 2007-03-21 08:22:52 EDT
Created attachment 150563 [details]
RHEL3 version of the RHEL5 patch
Comment 2 Ernie Petrides 2007-03-21 14:29:56 EDT
Removing dependency on RHEL4 bug 233114.
Comment 3 RHEL Product and Program Management 2007-03-21 20:01:07 EDT
This request was evaluated by Red Hat Product Management for inclusion in a Red
Hat Enterprise Linux maintenance release.  Product Management has requested
further review of this request by Red Hat Engineering, for potential
inclusion in a Red Hat Enterprise Linux Update release for currently deployed
products.  This request is not yet committed for inclusion in an Update
Comment 5 Ernie Petrides 2007-03-22 21:21:24 EDT
A fix for this problem has just been committed to the RHEL3 U9
patch pool this evening (in kernel version 2.4.21-47.8.EL).
Comment 6 Ernie Petrides 2007-04-02 16:36:29 EDT
*** Bug 233479 has been marked as a duplicate of this bug. ***
Comment 9 Red Hat Bugzilla 2007-06-11 14:00:11 EDT
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.


Note You need to log in before you can comment on or make changes to this bug.