[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#302082: marked as done (CAN-2005-0384: Linux Kernel PPP Driver Unspecified Remote Denial Of Service Vulnerability)



Your message dated Wed, 30 Mar 2005 07:29:53 -1000
with message-id <20050330172953.GC10300@kitenet.net>
and subject line Bug#302082: CAN-2005-0384: Linux Kernel PPP Driver Unspecified Remote Denial Of Service Vulnerability
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 30 Mar 2005 01:35:36 +0000
>From geoffc@strategicdata.com.au Tue Mar 29 17:35:36 2005
Return-path: <geoffc@strategicdata.com.au>
Received: from sdcarl02.strategicdata.com.au (sd01.mel.strategicdata.com.au) [203.214.67.82] 
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1DGS7L-0005yQ-00; Tue, 29 Mar 2005 17:35:36 -0800
Received: from sd01 (localhost [127.0.0.1])
	by mail-int.strategicdata.com.au (Postfix) with ESMTP id A43A1C000D48
	for <submit@bugs.debian.org>; Wed, 30 Mar 2005 11:35:33 +1000 (EST)
Received: 
	from sd01.mel.strategicdata.com.au (localhost [])
	by localhost ([127.0.0.1]);
	Wed, 30 Mar 2005 01:35:33 +0000
Received: from carthanach.mel.strategicdata.com.au (carthanach.mel.strategicdata.com.au [192.168.1.99])
	by sd01.mel.strategicdata.com.au (Postfix) with SMTP id 73D3FC000D48
	for <submit@bugs.debian.org>; Wed, 30 Mar 2005 11:35:33 +1000 (EST)
Received: by carthanach.mel.strategicdata.com.au (sSMTP sendmail emulation); Wed, 30 Mar 2005 11:35:33 +1000
From: "Geoff Crompton" <geoffc@strategicdata.com.au>
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: CAN-2005-0384: Linux Kernel PPP Driver Unspecified Remote Denial Of Service
 Vulnerability
X-Mailer: reportbug 3.8
Date: Wed, 30 Mar 2005 11:35:33 +1000
Message-Id: <[🔎] 20050330013533.73D3FC000D48@sd01.mel.strategicdata.com.au>
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: kernel-source-2.6.8
Version: 2.6.8-15
Severity: important

Quoting from the SecurityFocus item (bid 12810):
> Linux Kernel (Point-to-Point Protocol) PPP Driver is reported prone to
> an unspecified remote denial of service vulnerability.
> A successful attack can cause a denial of service condition in the
> server and prevent access to legitimate users.
> Linux Kernel 2.6.8 was reported vulnerable.  It is possible that
> subsequent versions are affected as well.
> Due to a lack of details, further information is not available at the
> moment.  This BID will be updated when more information becomes
> available.

Aren't many details listed there, but I thought it would be worth
opening a bug.
http://www.securityfocus.com/bid/12810

---------------------------------------
Received: (at 302082-done) by bugs.debian.org; 30 Mar 2005 17:26:56 +0000
>From joey@kitenet.net Wed Mar 30 09:26:56 2005
Return-path: <joey@kitenet.net>
Received: from kitenet.net [64.62.161.42] (postfix)
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1DGgy0-0000Oy-00; Wed, 30 Mar 2005 09:26:56 -0800
Received: from dragon.kitenet.net (unknown [66.168.94.177])
	(using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
	(Client CN "Joey Hess", Issuer "Joey Hess" (verified OK))
	by kitenet.net (Postfix) with ESMTP id 0D5A91836B;
	Wed, 30 Mar 2005 17:26:55 +0000 (GMT)
Received: by dragon.kitenet.net (Postfix, from userid 1000)
	id F315B6E618; Wed, 30 Mar 2005 07:29:53 -1000 (HST)
Date: Wed, 30 Mar 2005 07:29:53 -1000
From: Joey Hess <joeyh@debian.org>
To: Geoff Crompton <geoffc@strategicdata.com.au>,
	302082-done@bugs.debian.org
Subject: Re: Bug#302082: CAN-2005-0384: Linux Kernel PPP Driver Unspecified Remote Denial Of Service Vulnerability
Message-ID: <20050330172953.GC10300@kitenet.net>
References: <[🔎] 20050330013533.73D3FC000D48@sd01.mel.strategicdata.com.au>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
	protocol="application/pgp-signature"; boundary="+xNpyl7Qekk2NvDX"
Content-Disposition: inline
In-Reply-To: <[🔎] 20050330013533.73D3FC000D48@sd01.mel.strategicdata.com.au>
User-Agent: Mutt/1.5.8i
Delivered-To: 302082-done@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 


--+xNpyl7Qekk2NvDX
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Geoff Crompton wrote:
> Package: kernel-source-2.6.8
> Version: 2.6.8-15
> Severity: important
>=20
> Quoting from the SecurityFocus item (bid 12810):

This was fixed in the exact version of the package that you filed the
bug on.

--=20
see shy jo

--+xNpyl7Qekk2NvDX
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQFCSuIRd8HHehbQuO8RAoMDAJ9ayuhoWnpttNlE+4YQLTB+THfWdACgj12U
xjIIEa8unvx/uB96Y3srKh8=
=JYit
-----END PGP SIGNATURE-----

--+xNpyl7Qekk2NvDX--



Reply to: