[kernel-sec-discuss] r941 - active retired
jmm at alioth.debian.org
jmm at alioth.debian.org
Fri Aug 31 20:12:52 UTC 2007
Author: jmm
Date: 2007-08-31 20:12:52 +0000 (Fri, 31 Aug 2007)
New Revision: 941
Added:
active/CVE-2007-2878
Removed:
retired/CVE-2007-2878
Log:
this one is not retired, it's only temporarily excluded from the
next security update as the ABI needs to be changed
Copied: active/CVE-2007-2878 (from rev 939, retired/CVE-2007-2878)
===================================================================
--- active/CVE-2007-2878 (rev 0)
+++ active/CVE-2007-2878 2007-08-31 20:12:52 UTC (rev 941)
@@ -0,0 +1,29 @@
+Candidate: CVE-2007-2878
+References:
+ http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.2
+Description:
+ The VFAT compat ioctls in the Linux kernel before 2.6.21.2, when run
+ on a 64-bit system, allow local users to corrupt a kernel_dirent struct
+ and cause a denial of service (system crash) via unknown vectors.
+Ubuntu-Description:
+ Luca Tettamanti discovered a flaw in the VFAT compat ioctls on 64-bit
+ systems. A local attacker could corrupt a kernel_dirent struct and cause
+ a denial of service.
+Notes:
+ dannf> reproduced in etch using reproducer provided in the changeset
+ dannf> backporting the fix only proved hazardous as there was some recent
+ dannf> restructuring - i've elected to backport that as well
+ dannf> (fat-move-ioctl-compat-code.patch)
+ dannf> marking sarge kernels as N/A because amd64 wasn't officially supported
+ dannf> and the backport is non-trivial (read: risk outweighs benefit)
+ dannf>
+ dannf> reverted from etch-security branch in r9295 due to ABI change
+Bugs:
+upstream: released (2.6.21.2)
+linux-2.6: released (2.6.21-3)
+2.6.18-etch-security: ignored (2.6.18.dfsg.1-13etch1) "ABI breaker"
+2.6.8-sarge-security: N/A
+2.4.27-sarge-security: N/A
+2.6.15-dapper-security: released (2.6.15-28.57)
+2.6.17-edgy-security: released (2.6.17.1-11.39) [6dbbec837f43196339b1638dc799d898fcba9302]
+2.6.20-feisty-security: released (2.6.20-16.31) [5825ab378271ac6ead26504a46b0d404b63592dc]
Deleted: retired/CVE-2007-2878
===================================================================
--- retired/CVE-2007-2878 2007-08-31 20:11:58 UTC (rev 940)
+++ retired/CVE-2007-2878 2007-08-31 20:12:52 UTC (rev 941)
@@ -1,29 +0,0 @@
-Candidate: CVE-2007-2878
-References:
- http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.2
-Description:
- The VFAT compat ioctls in the Linux kernel before 2.6.21.2, when run
- on a 64-bit system, allow local users to corrupt a kernel_dirent struct
- and cause a denial of service (system crash) via unknown vectors.
-Ubuntu-Description:
- Luca Tettamanti discovered a flaw in the VFAT compat ioctls on 64-bit
- systems. A local attacker could corrupt a kernel_dirent struct and cause
- a denial of service.
-Notes:
- dannf> reproduced in etch using reproducer provided in the changeset
- dannf> backporting the fix only proved hazardous as there was some recent
- dannf> restructuring - i've elected to backport that as well
- dannf> (fat-move-ioctl-compat-code.patch)
- dannf> marking sarge kernels as N/A because amd64 wasn't officially supported
- dannf> and the backport is non-trivial (read: risk outweighs benefit)
- dannf>
- dannf> reverted from etch-security branch in r9295 due to ABI change
-Bugs:
-upstream: released (2.6.21.2)
-linux-2.6: released (2.6.21-3)
-2.6.18-etch-security: ignored (2.6.18.dfsg.1-13etch1) "ABI breaker"
-2.6.8-sarge-security: N/A
-2.4.27-sarge-security: N/A
-2.6.15-dapper-security: released (2.6.15-28.57)
-2.6.17-edgy-security: released (2.6.17.1-11.39) [6dbbec837f43196339b1638dc799d898fcba9302]
-2.6.20-feisty-security: released (2.6.20-16.31) [5825ab378271ac6ead26504a46b0d404b63592dc]
More information about the kernel-sec-discuss
mailing list