[kernel-sec-discuss] r700 - active

Dann Frazier dannf at alioth.debian.org
Sat Feb 10 20:49:46 CET 2007


Author: dannf
Date: 2007-02-10 20:49:46 +0100 (Sat, 10 Feb 2007)
New Revision: 700

Modified:
   active/CVE-2006-6333
Log:
flesh out & mark Debian's linux-2.6 N/A

Modified: active/CVE-2006-6333
===================================================================
--- active/CVE-2006-6333	2007-02-08 09:35:16 UTC (rev 699)
+++ active/CVE-2006-6333	2007-02-10 19:49:46 UTC (rev 700)
@@ -1,12 +1,18 @@
 Candidate: CVE-2006-6333
 References: 
-Description: 
+ CONFIRM:http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ee28b0da1069ced1688aa9d0b7b378353b988321
+ CONFIRM:http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=blobdiff;h=0d97e10ccac580e16d3dffbe4a9a88144360e64a;hp=bfe59865b1dd50e5c4dbd4cefe506a31e1495a1a;hb=ee28b0da1069ced1688aa9d0b7b378353b988321;f=drivers/net/tokenring/ibmtr.c 
+Description:
+ The tr_rx function in ibmtr.c for Linux kernel 2.6.19 assigns the wrong flag
+ to the ip_summed field, which allows remote attackers to cause a denial of
+ service (memory corruption) via crafted packets that cause the kernel to
+ interpret another field as an offset.
 Ubuntu-Description: 
 Notes: 
  jmm> Only 2.6.19 is affected
 Bugs: 
 upstream: 
-linux-2.6: 
+linux-2.6: N/A
 2.6.18-etch: N/A 
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A




More information about the kernel-sec-discuss mailing list