[kernel-sec-discuss] r854 - active

keescook-guest at alioth.debian.org keescook-guest at alioth.debian.org
Mon Jun 11 17:06:28 UTC 2007


Author: keescook-guest
Date: 2007-06-11 17:06:28 +0000 (Mon, 11 Jun 2007)
New Revision: 854

Added:
   active/CVE-2007-2875
   active/CVE-2007-2876
Modified:
   active/CVE-2007-1861
   active/CVE-2007-2453
   active/CVE-2007-2878
Log:
Added CVE-2007-2875, CVE-2007-2876.
Updated ubuntu kernels


Modified: active/CVE-2007-1861
===================================================================
--- active/CVE-2007-1861	2007-06-08 23:08:14 UTC (rev 853)
+++ active/CVE-2007-1861	2007-06-11 17:06:28 UTC (rev 854)
@@ -15,4 +15,4 @@
 2.6.12-breezy-security: N/A
 2.6.15-dapper-security: needed
 2.6.17-edgy-security: needed
-2.6.20-feisty-security: needed
+2.6.20-feisty-security: N/A

Modified: active/CVE-2007-2453
===================================================================
--- active/CVE-2007-2453	2007-06-08 23:08:14 UTC (rev 853)
+++ active/CVE-2007-2453	2007-06-11 17:06:28 UTC (rev 854)
@@ -2,6 +2,7 @@
 References: 
  http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7f397dcdb78d699a20d96bfcfb595a2411a5bbd2
  http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=602b6aeefe8932dd8bb15014e8fe6bb25d736361
+ http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4
 Description: 
 Ubuntu-Description: 
  The random number generator was hashing a subset of the available
@@ -10,7 +11,7 @@
  time, leading to a repeatable series of random numbers.
 Notes: 
 Bugs: 
-upstream: 
+upstream: published (2.6.21.4)
 linux-2.6: 
 2.6.18-etch-security: 
 2.6.8-sarge-security: 

Added: active/CVE-2007-2875
===================================================================
--- active/CVE-2007-2875	                        (rev 0)
+++ active/CVE-2007-2875	2007-06-11 17:06:28 UTC (rev 854)
@@ -0,0 +1,18 @@
+Candidate: CVE-2007-2875
+References: 
+ http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.20.y.git;a=commit;h=85badbdf5120d246ce2bb3f1a7689a805f9c9006
+ http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4
+Description: 
+Ubuntu-Description: 
+Notes: 
+ Use simple_read_from_buffer to avoid possible underflow in
+ cpuset_tasks_read which could allow user to read kernel memory.
+Bugs: 
+upstream: released (2.6.21.4)
+linux-2.6: 
+2.6.18-etch-security: 
+2.6.8-sarge-security: 
+2.4.27-sarge-security: 
+2.6.15-dapper-security: needed
+2.6.17-edgy-security: needed
+2.6.20-feisty-security: needed

Added: active/CVE-2007-2876
===================================================================
--- active/CVE-2007-2876	                        (rev 0)
+++ active/CVE-2007-2876	2007-06-11 17:06:28 UTC (rev 854)
@@ -0,0 +1,18 @@
+Candidate: CVE-2007-2876
+References: 
+ http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4
+Description: 
+Ubuntu-Description: 
+Notes: 
+ When creating a new connection by sending an unknown chunk type, we
+ don't transition to a valid state, causing a NULL pointer dereference in
+ sctp_packet when accessing sctp_timeouts[SCTP_CONNTRACK_NONE].
+Bugs: 
+upstream: released (2.6.21.4)
+linux-2.6: 
+2.6.18-etch-security: 
+2.6.8-sarge-security: 
+2.4.27-sarge-security: 
+2.6.15-dapper-security: needed
+2.6.17-edgy-security: needed
+2.6.20-feisty-security: needed

Modified: active/CVE-2007-2878
===================================================================
--- active/CVE-2007-2878	2007-06-08 23:08:14 UTC (rev 853)
+++ active/CVE-2007-2878	2007-06-11 17:06:28 UTC (rev 854)
@@ -1,6 +1,10 @@
 Candidate: CVE-2007-2878
-References: 
+References:
+ http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.2
 Description: 
+ The VFAT compat ioctls in the Linux kernel before 2.6.21.2, when run
+ on a 64-bit system, allow local users to corrupt a kernel_dirent struct
+ and cause a denial of service (system crash) via unknown vectors.
 Ubuntu-Description: 
 Notes: 
 Bugs: 




More information about the kernel-sec-discuss mailing list