diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2007-08-17 19:57:11 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2007-08-17 19:57:11 +0000 |
commit | 5b534abe9146ac3a2575c0627c85f253f4b7b078 (patch) | |
tree | 807cb66bc51470dc0a1eb822dd257571f1ca3cb5 /retired/CVE-2006-4623 | |
parent | 84fd3b155ec03e55afc5bf7d38fef70a23917f3b (diff) |
retire two more
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@917 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2006-4623')
-rw-r--r-- | retired/CVE-2006-4623 | 31 |
1 files changed, 31 insertions, 0 deletions
diff --git a/retired/CVE-2006-4623 b/retired/CVE-2006-4623 new file mode 100644 index 00000000..383c3f5e --- /dev/null +++ b/retired/CVE-2006-4623 @@ -0,0 +1,31 @@ +Candidate: CVE-2006-4623 +References: + http://lkml.org/lkml/2006/8/20/278 +Description: + The Unidirectional Lightweight Encapsulation (ULE) decapsulation + component in dvb-core/dvb_net.c in the dvb driver in the Linux kernel + 2.6.17.8 allows remote attackers to cause a denial of service (crash) + via an SNDU length of 0 in a ULE packet. +Ubuntu-Description: + A flaw was discovered in dvb ULE decapsulation. A remote attacker could + send a specially crafted message and cause a denial of service. +Notes: + mpitt> Questionable -- rather than fixing the kernel to not send out + invalid ULE packets, it should be fixed to not crash upon + receiving one. + dannf> I noticed that a different, and much larger patch went into 2.6.18 + that conflicts with the one provided by the original reporter (which + went into 2.6.17.y). I asked the original reporter if that patch also + fixed the issue. Ang Way replied: + "Yes, it is fixed in 2.6.18 and later even though the patch is + different. Their fix is more elegant." + So, marking etch N/A +Bugs: +upstream: released (2.6.18) +linux-2.6: released (2.6.18-1) +2.6.18-etch-security: N/A +2.6.8-sarge-security: released (2.6.8-16sarge7) [dvb-core-handle-0-length-ule-sndu.dpatch] +2.4.27-sarge-security: N/A +2.6.15-dapper-security: released (2.6.15-28.57) +2.6.17-edgy: released (2.6.17.1-10.34) +2.6.20-feisty-security: N/A |