** Changed in: linux-armadaxp (Ubuntu Precise)
       Status: New => Invalid

** Changed in: linux-armadaxp (Ubuntu Quantal)
       Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Lucid)
       Status: New => Invalid

** Changed in: linux-lts-quantal (Ubuntu Precise)
       Status: New => Invalid

** Changed in: linux (Ubuntu Precise)
       Status: New => Invalid

** Changed in: linux (Ubuntu Lucid)
       Status: New => Invalid

** Changed in: linux (Ubuntu Quantal)
       Status: New => Invalid

** Changed in: linux (Ubuntu Raring)
       Status: New => Invalid

** Changed in: linux-ti-omap4 (Ubuntu Precise)
       Status: New => Invalid

** Changed in: linux-ti-omap4 (Ubuntu Saucy)
       Status: New => Invalid

** Changed in: linux-ti-omap4 (Ubuntu Quantal)
       Status: New => Invalid

** Changed in: linux-ti-omap4 (Ubuntu Raring)
       Status: New => Invalid

** Changed in: linux-lts-raring (Ubuntu Precise)
       Status: New => Invalid

** Description changed:

- net: deadloop path in skb_flow_dissect()
+ The skb_flow_dissect function in net/core/flow_dissector.c in the Linux
+ kernel through 3.12 allows remote attackers to cause a denial of service
+ (infinite loop) via a small value in the IHL field of a packet with IPIP
+ encapsulation.
  
- Break-Fix: f9e42b853523cda0732022c2e0473c183f7aec65
- 7926c1d5be0b7cbe5b8d5c788d7d39237e7b212c
+ Break-Fix: ec5efe7946280d1e84603389a1030ccec0a767ae
+ 6f092343855a71e03b8d209815d8c45bf3a27fcd

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1248700

Title:
  CVE-2013-4348

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1248700/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to