r4463 - people/micah

Dann Frazier dannf at costa.debian.org
Fri Oct 14 17:23:49 UTC 2005


Author: dannf
Date: 2005-10-14 17:23:49 +0000 (Fri, 14 Oct 2005)
New Revision: 4463

Modified:
   people/micah/pending_CVE_requests
Log:
more info on the net-bridge-forwarding-poison-* patches


Modified: people/micah/pending_CVE_requests
===================================================================
--- people/micah/pending_CVE_requests	2005-10-14 17:08:37 UTC (rev 4462)
+++ people/micah/pending_CVE_requests	2005-10-14 17:23:49 UTC (rev 4463)
@@ -39,13 +39,14 @@
 Draft CVE text:
 Spoofed source addresses on the public facing side of a bridge can
 cause packet leaks due to poisoning of the bridge forwarding table by
-frames that have been dropped by filtering. 
+frames that have been dropped by filtering.  This bug has been fixed in Linux
+2.6.12 and later.
 URL: http://linux.bkbits.net:8080/linux-2.6/cset@412d2246sXjFQD6OadAB57YWvqR9vQ
 URL: http://linux.bkbits.net:8080/linux-2.6/cset@1.3097.18.19?nav=index.html|src/|src/net|src/net/bridge|related/net/bridge/br_input.c
 M: the following are pre-requisites:
 M: net-bridge-mangle-oops-1.dpatch
 M: net-bridge-mangle-oops-2.dpatch
-TODO: What upstream version is affected by this, and which is fixed?
+dannf: This patch appears applicable to 2.6.0->2.6.11 (as noted above)
 
 * net-rose-ndigis-verify.dpatch
 Draft CVE text:




More information about the Kernel-svn-changes mailing list