[kernel-sec-discuss] r885 - active
jmm at alioth.debian.org
jmm at alioth.debian.org
Thu Jul 5 13:06:54 UTC 2007
Author: jmm
Date: 2007-07-05 13:06:54 +0000 (Thu, 05 Jul 2007)
New Revision: 885
Modified:
active/CVE-2007-2172
active/CVE-2007-2525
Log:
update some patch stati
Modified: active/CVE-2007-2172
===================================================================
--- active/CVE-2007-2172 2007-07-04 15:16:35 UTC (rev 884)
+++ active/CVE-2007-2172 2007-07-05 13:06:54 UTC (rev 885)
@@ -17,8 +17,8 @@
upstream: released (2.6.21)
linux-2.6: released (2.6.21-1)
2.6.18-etch-security: needed
-2.6.8-sarge-security:
-2.4.27-sarge-security:
+2.6.8-sarge-security: needed
+2.4.27-sarge-security: needed
2.6.15-dapper-security: released (2.6.15-28.54)
2.6.17-edgy-security: released (2.6.17.1-11.38)
2.6.20-feisty-security: released (2.6.20-16.28)
Modified: active/CVE-2007-2525
===================================================================
--- active/CVE-2007-2525 2007-07-04 15:16:35 UTC (rev 884)
+++ active/CVE-2007-2525 2007-07-05 13:06:54 UTC (rev 885)
@@ -1,14 +1,19 @@
Candidate: CVE-2007-2525
References:
Description:
+ Memory leak in the PPP over Ethernet (PPPoE) socket implementation in the
+ Linux kernel before 2.6.21-git8 allows local users to cause a denial of
+ service (memory consumption) by creating a socket using connect, and
+ releasing it before the PPPIOCGCHAN ioctl is initialized.
Ubuntu-Description:
Notes:
+ jmm> 202a03acf9994076055df40ae093a5c5474ad0bd
Bugs:
-upstream:
-linux-2.6:
-2.6.18-etch-security:
-2.6.8-sarge-security:
-2.4.27-sarge-security:
+upstream: released (2.6.21)
+linux-2.6: released (2.6.21-1)
+2.6.18-etch-security: needed
+2.6.8-sarge-security: needed
+2.4.27-sarge-security: needed
2.6.15-dapper-security:
2.6.17-edgy-security: pending (2.6.17.1-11.39) [123623f9ad4d9bbe55c03b33ce79123e948b107f]
2.6.20-feisty-security:
More information about the kernel-sec-discuss
mailing list