Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#8707 - [Security] Kernel26 needs bump to .8 to fix _remote_ DoS
Attached to Project:
Arch Linux
Opened by Glenn Matthys (RedShift) - Monday, 19 November 2007, 09:23 GMT
Last edited by Tobias Powalowski (tpowa) - Monday, 19 November 2007, 12:49 GMT
Opened by Glenn Matthys (RedShift) - Monday, 19 November 2007, 09:23 GMT
Last edited by Tobias Powalowski (tpowa) - Monday, 19 November 2007, 12:49 GMT
|
DetailsDescription:
linux < 2.6.23.8 have a very serious remote DoS vulnerability: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5501 "The tcp_sacktag_write_queue function in net/ipv4/tcp_input.c in Linux kernel 2.6.24-rc2 and earlier allows remote attackers to cause a denial of service (crash) via crafted ACK responses that trigger a NULL pointer dereference." |
This task depends upon
Comment by Tobias Powalowski (tpowa) -
Monday, 19 November 2007, 09:34 GMT
it is already in testing