[kernel-sec-discuss] r767 - active retired

Moritz Muehlenhoff jmm at alioth.debian.org
Sun Apr 29 20:48:51 UTC 2007


Author: jmm
Date: 2007-04-29 20:48:51 +0000 (Sun, 29 Apr 2007)
New Revision: 767

Added:
   retired/CVE-2007-0772
Removed:
   active/CVE-2007-0772
Log:
retire CVE-2007-0772


Deleted: active/CVE-2007-0772
===================================================================
--- active/CVE-2007-0772	2007-04-29 20:48:35 UTC (rev 766)
+++ active/CVE-2007-0772	2007-04-29 20:48:51 UTC (rev 767)
@@ -1,22 +0,0 @@
-Candidate: CVE-2007-0772
-References: 
- CONFIRM:http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.1
- FRSIRT:ADV-2007-0660
- URL:http://www.frsirt.com/english/advisories/2007/0660
- SECUNIA:24215
- URL:http://secunia.com/advisories/24215
-Description: 
- The Linux kernel before 2.6.20.1 allows remote attackers to cause a denial
- of service (oops) via a crafed NFSACL 2 ACCESS request that triggers a free
- of an incorrect pointer.
-Ubuntu-Description: 
-Notes: 
- dannf> sarge doesn't have the affected source file
-Bugs: 
-upstream: released (2.6.20.1)
-linux-2.6: released (2.6.18.dfsg.1-11) [bugfix/nfs-acl-free-wrong-pointer.patch]
-2.6.18-etch-security: released (2.6.18.dfsg.1-11) [bugfix/nfs-acl-free-wrong-pointer.patch]
-2.6.8-sarge-security: N/A
-2.4.27-sarge-security: N/A
-2.6.15-dapper-security: released (2.6.15-28.53)
-2.6.17-edgy-security: released (2.6.17.1-11.37)

Copied: retired/CVE-2007-0772 (from rev 766, active/CVE-2007-0772)




More information about the kernel-sec-discuss mailing list