[kernel-sec-discuss] r854 - active
keescook-guest at alioth.debian.org
keescook-guest at alioth.debian.org
Mon Jun 11 17:06:28 UTC 2007
Author: keescook-guest
Date: 2007-06-11 17:06:28 +0000 (Mon, 11 Jun 2007)
New Revision: 854
Added:
active/CVE-2007-2875
active/CVE-2007-2876
Modified:
active/CVE-2007-1861
active/CVE-2007-2453
active/CVE-2007-2878
Log:
Added CVE-2007-2875, CVE-2007-2876.
Updated ubuntu kernels
Modified: active/CVE-2007-1861
===================================================================
--- active/CVE-2007-1861 2007-06-08 23:08:14 UTC (rev 853)
+++ active/CVE-2007-1861 2007-06-11 17:06:28 UTC (rev 854)
@@ -15,4 +15,4 @@
2.6.12-breezy-security: N/A
2.6.15-dapper-security: needed
2.6.17-edgy-security: needed
-2.6.20-feisty-security: needed
+2.6.20-feisty-security: N/A
Modified: active/CVE-2007-2453
===================================================================
--- active/CVE-2007-2453 2007-06-08 23:08:14 UTC (rev 853)
+++ active/CVE-2007-2453 2007-06-11 17:06:28 UTC (rev 854)
@@ -2,6 +2,7 @@
References:
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7f397dcdb78d699a20d96bfcfb595a2411a5bbd2
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=602b6aeefe8932dd8bb15014e8fe6bb25d736361
+ http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4
Description:
Ubuntu-Description:
The random number generator was hashing a subset of the available
@@ -10,7 +11,7 @@
time, leading to a repeatable series of random numbers.
Notes:
Bugs:
-upstream:
+upstream: published (2.6.21.4)
linux-2.6:
2.6.18-etch-security:
2.6.8-sarge-security:
Added: active/CVE-2007-2875
===================================================================
--- active/CVE-2007-2875 (rev 0)
+++ active/CVE-2007-2875 2007-06-11 17:06:28 UTC (rev 854)
@@ -0,0 +1,18 @@
+Candidate: CVE-2007-2875
+References:
+ http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.20.y.git;a=commit;h=85badbdf5120d246ce2bb3f1a7689a805f9c9006
+ http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4
+Description:
+Ubuntu-Description:
+Notes:
+ Use simple_read_from_buffer to avoid possible underflow in
+ cpuset_tasks_read which could allow user to read kernel memory.
+Bugs:
+upstream: released (2.6.21.4)
+linux-2.6:
+2.6.18-etch-security:
+2.6.8-sarge-security:
+2.4.27-sarge-security:
+2.6.15-dapper-security: needed
+2.6.17-edgy-security: needed
+2.6.20-feisty-security: needed
Added: active/CVE-2007-2876
===================================================================
--- active/CVE-2007-2876 (rev 0)
+++ active/CVE-2007-2876 2007-06-11 17:06:28 UTC (rev 854)
@@ -0,0 +1,18 @@
+Candidate: CVE-2007-2876
+References:
+ http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4
+Description:
+Ubuntu-Description:
+Notes:
+ When creating a new connection by sending an unknown chunk type, we
+ don't transition to a valid state, causing a NULL pointer dereference in
+ sctp_packet when accessing sctp_timeouts[SCTP_CONNTRACK_NONE].
+Bugs:
+upstream: released (2.6.21.4)
+linux-2.6:
+2.6.18-etch-security:
+2.6.8-sarge-security:
+2.4.27-sarge-security:
+2.6.15-dapper-security: needed
+2.6.17-edgy-security: needed
+2.6.20-feisty-security: needed
Modified: active/CVE-2007-2878
===================================================================
--- active/CVE-2007-2878 2007-06-08 23:08:14 UTC (rev 853)
+++ active/CVE-2007-2878 2007-06-11 17:06:28 UTC (rev 854)
@@ -1,6 +1,10 @@
Candidate: CVE-2007-2878
-References:
+References:
+ http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.2
Description:
+ The VFAT compat ioctls in the Linux kernel before 2.6.21.2, when run
+ on a 64-bit system, allow local users to corrupt a kernel_dirent struct
+ and cause a denial of service (system crash) via unknown vectors.
Ubuntu-Description:
Notes:
Bugs:
More information about the kernel-sec-discuss
mailing list