[kernel-sec-discuss] r3532 - active retired

Moritz Muehlenhoff jmm at moszumanska.debian.org
Thu Nov 6 10:41:47 UTC 2014


Author: jmm
Date: 2014-11-06 10:41:47 +0000 (Thu, 06 Nov 2014)
New Revision: 3532

Added:
   retired/CVE-2014-7207
Removed:
   active/CVE-2014-7207
Log:
retire


Deleted: active/CVE-2014-7207
===================================================================
--- active/CVE-2014-7207	2014-11-06 10:41:20 UTC (rev 3531)
+++ active/CVE-2014-7207	2014-11-06 10:41:47 UTC (rev 3532)
@@ -1,18 +0,0 @@
-Description: Denial of service by sending IPv6 UFO packet through tap
-References:
-Notes:
- bwh> Bug was introduced in 3.2.63 (and 3.4.101) by the backport of
- bwh> commit 73f156a6e8c1 ("inetpeer: get rid of ip_id_count") which
- bwh> assumes ipv6_select_ident() is called with a non-null struct
- bwh> rt6_info pointer.  That was not true as they were missing commit
- bwh> 916e4cf46d02 ("ipv6: reuse ip6_frag_id from ip6_ufo_append_data").
- bwh> Neither the upstream kernel nor any other stable branch had this
- bwh> bug.
-Bugs: #766195
-upstream: N/A
-2.6.32-upstream-stable: N/A
-sid: N/A
-3.2-wheezy-security: released (3.2.63-2+deb7u1) [bugfix/all/ipv6-reuse-ip6_frag_id-from-ip6_ufo_append_data.patch]
-2.6.32-squeeze-security: N/A
-3.16-upstream-stable: N/A
-3.2-upstream-stable: released (3.2.64)

Copied: retired/CVE-2014-7207 (from rev 3531, active/CVE-2014-7207)
===================================================================
--- retired/CVE-2014-7207	                        (rev 0)
+++ retired/CVE-2014-7207	2014-11-06 10:41:47 UTC (rev 3532)
@@ -0,0 +1,18 @@
+Description: Denial of service by sending IPv6 UFO packet through tap
+References:
+Notes:
+ bwh> Bug was introduced in 3.2.63 (and 3.4.101) by the backport of
+ bwh> commit 73f156a6e8c1 ("inetpeer: get rid of ip_id_count") which
+ bwh> assumes ipv6_select_ident() is called with a non-null struct
+ bwh> rt6_info pointer.  That was not true as they were missing commit
+ bwh> 916e4cf46d02 ("ipv6: reuse ip6_frag_id from ip6_ufo_append_data").
+ bwh> Neither the upstream kernel nor any other stable branch had this
+ bwh> bug.
+Bugs: #766195
+upstream: N/A
+2.6.32-upstream-stable: N/A
+sid: N/A
+3.2-wheezy-security: released (3.2.63-2+deb7u1) [bugfix/all/ipv6-reuse-ip6_frag_id-from-ip6_ufo_append_data.patch]
+2.6.32-squeeze-security: N/A
+3.16-upstream-stable: N/A
+3.2-upstream-stable: released (3.2.64)




More information about the kernel-sec-discuss mailing list