Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 3 Nov 2010 18:15:30 -0400
From: Dan Rosenberg <>
Subject: CVE request: X.25 remote DoS

Due to bad parsing of malformed X.25 facilities, a remote attacker can
cause a kernel panic due to heap corruption (assuming both parties are
communicating using X.25).  Since the below post, the X.25 maintainer
has confirmed the issue.



Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ