[kernel-sec-discuss] r784 - active retired
Dann Frazier
dannf at alioth.debian.org
Mon Apr 30 23:07:15 UTC 2007
Author: dannf
Date: 2007-04-30 23:07:13 +0000 (Mon, 30 Apr 2007)
New Revision: 784
Added:
retired/CVE-2006-2446
Removed:
active/CVE-2006-2446
Log:
retire CVE-2006-2446
Deleted: active/CVE-2006-2446
===================================================================
--- active/CVE-2006-2446 2007-04-30 23:06:44 UTC (rev 783)
+++ active/CVE-2006-2446 2007-04-30 23:07:13 UTC (rev 784)
@@ -1,24 +0,0 @@
-Candidate: CVE-2006-2446
-References:
- REDHAT:RHSA-2006:0575
- URL:http://www.redhat.com/support/errata/RHSA-2006-0575.html
- MISC:https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=192779
- SECUNIA:21465
- URL:http://secunia.com/advisories/21465
-Description:
- Race condition between the kfree_skb and __skb_unlink functions in
- the socket buffer handling in Linux kernel 2.6.9, and possibly other
- versions, allows remote attackers to cause a denial of service
- (crash), as demonstrated using the TCP stress tests from the LTP test
- suite.
-Ubuntu-Description:
-Notes:
-Bugs:
-upstream: released (2.6.11)
-linux-2.6: N/A
-2.6.8-sarge-security: released (2.6.8-16sarge5) [kfree_skb-race.dpatch]
-2.4.27-sarge-security: released (2.4.27-10sarge4) [227_kfree_skb.diff]
-2.6.12-breezy-security: N/A
-2.6.15-dapper-security: N/A
-2.6.17-edgy: N/A
-2.6.18-etch-security: N/A
Copied: retired/CVE-2006-2446 (from rev 783, active/CVE-2006-2446)
More information about the kernel-sec-discuss
mailing list