r4463 - people/micah
Dann Frazier
dannf at costa.debian.org
Fri Oct 14 17:23:49 UTC 2005
Author: dannf
Date: 2005-10-14 17:23:49 +0000 (Fri, 14 Oct 2005)
New Revision: 4463
Modified:
people/micah/pending_CVE_requests
Log:
more info on the net-bridge-forwarding-poison-* patches
Modified: people/micah/pending_CVE_requests
===================================================================
--- people/micah/pending_CVE_requests 2005-10-14 17:08:37 UTC (rev 4462)
+++ people/micah/pending_CVE_requests 2005-10-14 17:23:49 UTC (rev 4463)
@@ -39,13 +39,14 @@
Draft CVE text:
Spoofed source addresses on the public facing side of a bridge can
cause packet leaks due to poisoning of the bridge forwarding table by
-frames that have been dropped by filtering.
+frames that have been dropped by filtering. This bug has been fixed in Linux
+2.6.12 and later.
URL: http://linux.bkbits.net:8080/linux-2.6/cset@412d2246sXjFQD6OadAB57YWvqR9vQ
URL: http://linux.bkbits.net:8080/linux-2.6/cset@1.3097.18.19?nav=index.html|src/|src/net|src/net/bridge|related/net/bridge/br_input.c
M: the following are pre-requisites:
M: net-bridge-mangle-oops-1.dpatch
M: net-bridge-mangle-oops-2.dpatch
-TODO: What upstream version is affected by this, and which is fixed?
+dannf: This patch appears applicable to 2.6.0->2.6.11 (as noted above)
* net-rose-ndigis-verify.dpatch
Draft CVE text:
More information about the Kernel-svn-changes
mailing list