summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2006-5619
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2007-04-30 17:04:40 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2007-04-30 17:04:40 +0000
commit8290df912ecbf23e19610e57952fc68c45d59103 (patch)
tree460afa9d494ee7898cf23cf2457b5e18d8dee802 /retired/CVE-2006-5619
parent9af4eb6f3374a8fc487127afceaf1d73793ae3a1 (diff)
retire two more issues
record upstream fix git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@773 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2006-5619')
-rw-r--r--retired/CVE-2006-561923
1 files changed, 23 insertions, 0 deletions
diff --git a/retired/CVE-2006-5619 b/retired/CVE-2006-5619
new file mode 100644
index 00000000..2a7a48cf
--- /dev/null
+++ b/retired/CVE-2006-5619
@@ -0,0 +1,23 @@
+Candidate: CVE-2006-5619
+References:
+ http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bcd620757d3a4ae78ef0ca41adb5d9e400ed92b6
+Description:
+ The seqfile handling (ip6fl_get_n function in ip6_flowlabel.c) in
+ Linux kernel 2.6.16, 2.6.17, and 2.6.18-stable allows local users to
+ cause a denial of service (hang or oops) via unspecified manipulations
+ that trigger an infinite loop while searching for flowlabels.
+Ubuntu-Description:
+ James Morris discovered that the ip6fl_get_n() function incorrectly
+ handled flow labels. A local attacker could exploit this to crash the
+ kernel.
+Notes:
+ dannf> This code does not appear to be present in 2.4
+Bugs:
+upstream: released (2.6.18.2)
+linux-2.6: released (2.6.18-4)
+2.6.8-sarge-security: released (2.6.8-16sarge6) [ip6_flowlabel-lockup.dpatch]
+2.4.27-sarge-security: N/A
+2.6.12-breezy-security: released (2.6.12-10.41)
+2.6.15-dapper-security: released (2.6.15-27.49)
+2.6.17-edgy-security: released (2.6.17.1-10.34)
+2.6.19-feisty: released

© 2014-2024 Faster IT GmbH | imprint | privacy policy