[kernel-sec-discuss] r839 - active ignored retired

jmm at alioth.debian.org jmm at alioth.debian.org
Sun May 27 15:33:24 UTC 2007


Author: jmm
Date: 2007-05-27 15:33:24 +0000 (Sun, 27 May 2007)
New Revision: 839

Added:
   ignored/CVE-2007-1217
   retired/CVE-2006-2275
   retired/CVE-2006-6058
Removed:
   active/CVE-2007-1217
Log:
ignore CVE-2007-1217


Deleted: active/CVE-2007-1217
===================================================================
--- active/CVE-2007-1217	2007-05-25 05:34:33 UTC (rev 838)
+++ active/CVE-2007-1217	2007-05-27 15:33:24 UTC (rev 839)
@@ -1,23 +0,0 @@
-Candidate: CVE-2007-1217
-References: 
-Description: 
-Ubuntu-Description: 
-Notes: 
- jmm> Analysis by Karsten Keil (the Linux ISDN maintainer) pointed out, that this
- jmm> is not exploitable over the ISDN network, as the generated CAPI messages
- jmm> cannot reach a size allowing an overflow.
- jmm> This could only be theoretically exploited if there's a pure CAPI server
- jmm> and even then it's only DoS.
- jmm>
- jmm> We'll ignore this, as it's not exploitable over ISDN
- jmm>
- jmm> http://bugzilla.kernel.org/show_bug.cgi?id=8028
-Bugs: 
-upstream: released (2.6.21)
-linux-2.6: released (2.6.21-1)
-2.6.18-etch-security: ignored
-2.6.8-sarge-security: ignored
-2.4.27-sarge-security: ignored
-2.6.15-dapper-security: 
-2.6.17-edgy-security: 
-2.6.20-feisty-security: 

Copied: ignored/CVE-2007-1217 (from rev 838, active/CVE-2007-1217)
===================================================================
--- ignored/CVE-2007-1217	                        (rev 0)
+++ ignored/CVE-2007-1217	2007-05-27 15:33:24 UTC (rev 839)
@@ -0,0 +1,23 @@
+Candidate: CVE-2007-1217
+References: 
+Description: 
+Ubuntu-Description: 
+Notes: 
+ jmm> Analysis by Karsten Keil (the Linux ISDN maintainer) pointed out, that this
+ jmm> is not exploitable over the ISDN network, as the generated CAPI messages
+ jmm> cannot reach a size allowing an overflow.
+ jmm> This could only be theoretically exploited if there's a pure CAPI server
+ jmm> and even then it's only DoS.
+ jmm>
+ jmm> We'll ignore this, as it's not exploitable over ISDN
+ jmm>
+ jmm> http://bugzilla.kernel.org/show_bug.cgi?id=8028
+Bugs: 
+upstream: released (2.6.21)
+linux-2.6: released (2.6.21-1)
+2.6.18-etch-security: ignored
+2.6.8-sarge-security: ignored
+2.4.27-sarge-security: ignored
+2.6.15-dapper-security: 
+2.6.17-edgy-security: 
+2.6.20-feisty-security: 

Copied: retired/CVE-2006-2275 (from rev 834, active/CVE-2006-2275)
===================================================================
--- retired/CVE-2006-2275	                        (rev 0)
+++ retired/CVE-2006-2275	2007-05-27 15:33:24 UTC (rev 839)
@@ -0,0 +1,21 @@
+Candidate: CVE-2006-2275
+References: 
+ http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7c3ceb4fb9667f34f1599a062efecf4cdc4a4ce5 
+Description: 
+ Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a
+ denial of service (deadlock) via a large number of small messages
+ to a receiver application that cannot process the messages quickly
+ enough, which leads to "spillover of the receive buffer."
+Notes: 
+ jmm> Seems like an ABI-breaker, the sctp_chunk struct is changed in the
+ jmm> upstream fix, this issue alone is not worth an ABI bump, a fix will
+ jmm> be postponed for now
+ jmm> For Sarge we'll ignore it, as it was only available under CONFIG_EXPERIMENTAL
+ jmm> and not suitable for production use anyway
+Bugs: 
+upstream: released (2.6.16.15)
+linux-2.6: released (2.6.16-13)
+2.6.8-sarge-security: ignored
+2.4.27-sarge-security: ignored
+2.6.18-etch-security: N/A
+

Copied: retired/CVE-2006-6058 (from rev 832, active/CVE-2006-6058)
===================================================================
--- retired/CVE-2006-6058	                        (rev 0)
+++ retired/CVE-2006-6058	2007-05-27 15:33:24 UTC (rev 839)
@@ -0,0 +1,26 @@
+Candidate: CVE-2006-6058
+References: 
+ MISC:http://projects.info-pull.com/mokb/MOKB-17-11-2006.html
+ FRSIRT:ADV-2006-4613
+ URL:http://www.frsirt.com/english/advisories/2006/4613
+ SECUNIA:23034
+ URL:http://secunia.com/advisories/23034 
+Description: 
+ The minix filesystem code in Linux kernel 2.6.x up to 2.6.18, and possibly
+ other versions, allows local users to cause a denial of service (hang) via a
+ malformed minix file stream that triggers an infinite loop in the minix_bmap
+ function. NOTE: this issue might be due to an integer overflow or signedness
+ error.
+Ubuntu-Description: 
+Notes: 
+ dannf> ignored for sarge for now - only applies under very rare circumstances
+        and don't know if there's an upstream fix
+ jmm> We can ignore this, it has no practical ramifications
+Bugs: 
+upstream: 
+linux-2.6: ignored
+2.6.18-etch-security: ignored
+2.6.8-sarge-security: ignored
+2.4.27-sarge-security: ignored
+2.6.15-dapper-security: needed
+2.6.17-edgy-security: needed




More information about the kernel-sec-discuss mailing list