diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2009-05-19 08:56:26 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2009-05-19 08:56:26 +0000 |
commit | f1e4fc7e464bceb6211ca56fd284c4b4487c5647 (patch) | |
tree | 5d86ee73b211e37d706653643540aa907fd5e3a2 /retired/CVE-2008-2750 | |
parent | c2a76db665da01ebf4372673baf728202d06b261 (diff) |
retire issues
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1381 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2008-2750')
-rw-r--r-- | retired/CVE-2008-2750 | 21 |
1 files changed, 21 insertions, 0 deletions
diff --git a/retired/CVE-2008-2750 b/retired/CVE-2008-2750 new file mode 100644 index 00000000..a89e59e1 --- /dev/null +++ b/retired/CVE-2008-2750 @@ -0,0 +1,21 @@ +Candidate: CVE-2008-2750 +Description: + The pppol2tp_recvmsg function in drivers/net/pppol2tp.c in the Linux + kernel 2.6 before 2.6.26-rc6 allows remote attackers to cause a denial + of service (kernel heap memory corruption and system crash) and possibly + have unspecified other impact via a crafted PPPOL2TP packet that results + in a large value for a certain length variable. +References: +Ubuntu-Description: +Notes: + kees> linux-2.6: 6b6707a50c7598a83820077393f8823ab791abf8 +Bugs: +upstream: released (2.6.26-rc6) +linux-2.6: released (2.6.26-1) +2.6.18-etch-security: N/A "code added after 2.6.18" +2.6.24-etch-security: released (2.6.24-6~etchnhalf.4) "bugfix/l2tp-pppol2tp_recvmsg-corruption.patch" +2.6.26-lenny-security: N/A +2.6.15-dapper-security: N/A +2.6.20-feisty-security: N/A +2.6.22-gutsy-security: N/A +2.6.24-hardy-security: released (2.6.24-19.36) |