[kernel-sec-discuss] r756 - active
Martin Pitt
mpitt at alioth.debian.org
Fri Apr 27 10:27:58 UTC 2007
Author: mpitt
Date: 2007-04-27 10:27:58 +0000 (Fri, 27 Apr 2007)
New Revision: 756
Modified:
active/CVE-2007-1000
Log:
CVE-2007-1000: ubuntu status
Modified: active/CVE-2007-1000
===================================================================
--- active/CVE-2007-1000 2007-04-26 21:15:52 UTC (rev 755)
+++ active/CVE-2007-1000 2007-04-27 10:27:58 UTC (rev 756)
@@ -4,6 +4,9 @@
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=286930797d74b2c9a5beae84836044f6a836235f
Description:
Ubuntu-Description:
+ Due to an variable handling flaw in the ipv6_getsockopt_sticky()
+ function a local attacker could exploit the getsockopt() calls to
+ read arbitrary kernel memory. This could disclose sensitive data.
Notes:
dannf> function doesn't exist in 2.6.8 - wtarreau says 2.4 isn't vulnerable
Bugs:
@@ -12,6 +15,6 @@
2.6.18-etch-security: pending (2.6.18.dfsg.1-11etch1) [bugfix/ipv6_getsockopt_sticky-null-opt.patch]
2.6.8-sarge-security: N/A
2.4.27-sarge-security: N/A
-2.6.12-breezy-security:
-2.6.15-dapper-security:
-2.6.17-edgy-security:
+2.6.15-dapper-security: needed
+2.6.17-edgy-security: needed
+2.6.20-feisty-security: needed
More information about the kernel-sec-discuss
mailing list