[kernel-sec-discuss] r701 - active retired

Dann Frazier dannf at alioth.debian.org
Sat Feb 10 20:50:37 CET 2007


Author: dannf
Date: 2007-02-10 20:50:37 +0100 (Sat, 10 Feb 2007)
New Revision: 701

Added:
   retired/CVE-2006-6333
Removed:
   active/CVE-2006-6333
Log:
retiring CVE-2006-6333 - it only affected 2.6.19, and we're not tracking any 2.6.19s

Deleted: active/CVE-2006-6333
===================================================================
--- active/CVE-2006-6333	2007-02-10 19:49:46 UTC (rev 700)
+++ active/CVE-2006-6333	2007-02-10 19:50:37 UTC (rev 701)
@@ -1,21 +0,0 @@
-Candidate: CVE-2006-6333
-References: 
- CONFIRM:http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ee28b0da1069ced1688aa9d0b7b378353b988321
- CONFIRM:http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=blobdiff;h=0d97e10ccac580e16d3dffbe4a9a88144360e64a;hp=bfe59865b1dd50e5c4dbd4cefe506a31e1495a1a;hb=ee28b0da1069ced1688aa9d0b7b378353b988321;f=drivers/net/tokenring/ibmtr.c 
-Description:
- The tr_rx function in ibmtr.c for Linux kernel 2.6.19 assigns the wrong flag
- to the ip_summed field, which allows remote attackers to cause a denial of
- service (memory corruption) via crafted packets that cause the kernel to
- interpret another field as an offset.
-Ubuntu-Description: 
-Notes: 
- jmm> Only 2.6.19 is affected
-Bugs: 
-upstream: 
-linux-2.6: N/A
-2.6.18-etch: N/A 
-2.6.8-sarge-security: N/A
-2.4.27-sarge-security: N/A
-2.6.12-breezy-security: N/A
-2.6.15-dapper-security: N/A
-2.6.17-edgy-security: N/A

Copied: retired/CVE-2006-6333 (from rev 700, active/CVE-2006-6333)




More information about the kernel-sec-discuss mailing list