[kernel-sec-discuss] r784 - active retired

Dann Frazier dannf at alioth.debian.org
Mon Apr 30 23:07:15 UTC 2007


Author: dannf
Date: 2007-04-30 23:07:13 +0000 (Mon, 30 Apr 2007)
New Revision: 784

Added:
   retired/CVE-2006-2446
Removed:
   active/CVE-2006-2446
Log:
retire CVE-2006-2446

Deleted: active/CVE-2006-2446
===================================================================
--- active/CVE-2006-2446	2007-04-30 23:06:44 UTC (rev 783)
+++ active/CVE-2006-2446	2007-04-30 23:07:13 UTC (rev 784)
@@ -1,24 +0,0 @@
-Candidate: CVE-2006-2446
-References: 
- REDHAT:RHSA-2006:0575
- URL:http://www.redhat.com/support/errata/RHSA-2006-0575.html
- MISC:https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=192779
- SECUNIA:21465
- URL:http://secunia.com/advisories/21465 
-Description: 
- Race condition between the kfree_skb and __skb_unlink functions in
- the socket buffer handling in Linux kernel 2.6.9, and possibly other
- versions, allows remote attackers to cause a denial of service
- (crash), as demonstrated using the TCP stress tests from the LTP test
- suite.
-Ubuntu-Description:
-Notes: 
-Bugs: 
-upstream: released (2.6.11)
-linux-2.6: N/A
-2.6.8-sarge-security: released (2.6.8-16sarge5) [kfree_skb-race.dpatch]
-2.4.27-sarge-security: released (2.4.27-10sarge4) [227_kfree_skb.diff]
-2.6.12-breezy-security: N/A
-2.6.15-dapper-security: N/A
-2.6.17-edgy: N/A
-2.6.18-etch-security: N/A

Copied: retired/CVE-2006-2446 (from rev 783, active/CVE-2006-2446)




More information about the kernel-sec-discuss mailing list