Never mentioned as such in the public, as far as I can tell (I searched quite a bit). No CVE
either, for that matter. It's old (2005), but this is the type of information I'm compiling.
Here's the official fix:
Short message is "[SELINUX]: Fix ipv6_skip_exthdr() invocation causing OOPS."
No mention of security in the short message or the detailed long message.
Some months later Arjan van de Ven posts to vendor-sec and the kernel security list:
From: Arjan van de Ven <firstname.lastname@example.org>
To: email@example.com, firstname.lastname@example.org
Subject: [vendor-sec] remote kernel DoS
X-Original-Date: Fri, 2 Sep 2005 10:30:58 +0200
we have reason to believe that
is beeing triggered from remote in the wild (two machines hitting it in the
same public cluster within 3 days).
It's fixed in kernel.org for a while now.
Assume this issue to be public since it's heavily discussed on public irc
No replies, and I can't find any evidence of this post resulting in any sort of public
announcement. I'm sure admitting SELinux *causing* a remote DoS was not something RedHat and
others were willing to admit.