The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.22 does not properly validate the hop-by-hop IPv6 extended header, which allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a crafted IPv6 packet.
https://rhn.redhat.com/errata/RHSA-2010-0095.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7474
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11083
https://exchange.xforce.ibmcloud.com/vulnerabilities/39171
https://bugzilla.redhat.com/show_bug.cgi?id=548641
http://www.ubuntu.com/usn/usn-574-1
http://www.securityfocus.com/bid/26943
http://www.redhat.com/support/errata/RHSA-2010-0053.html
http://www.redhat.com/support/errata/RHSA-2010-0019.html
http://secunia.com/advisories/38015
http://secunia.com/advisories/28706
http://secunia.com/advisories/28170