[kernel-sec-discuss] r1163 - active

keescook-guest at alioth.debian.org keescook-guest at alioth.debian.org
Wed May 7 21:22:58 UTC 2008


Author: keescook-guest
Date: 2008-05-07 21:22:55 +0000 (Wed, 07 May 2008)
New Revision: 1163

Modified:
   active/CVE-2008-0600
   active/CVE-2008-1294
   active/CVE-2008-1375
   active/CVE-2008-1669
Log:
ubuntu kernels triaged

Modified: active/CVE-2008-0600
===================================================================
--- active/CVE-2008-0600	2008-05-07 19:43:47 UTC (rev 1162)
+++ active/CVE-2008-0600	2008-05-07 21:22:55 UTC (rev 1163)
@@ -1,5 +1,10 @@
 Candidate: CVE-2008-0600
 Description: 
+ The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1
+ does not validate a certain userspace pointer before dereference, which
+ allows local users to gain root privileges via crafted arguments in
+ a vmsplice system call, a different vulnerability than CVE-2008-0009
+ and CVE-2008-0010.
 References: 
 Ubuntu-Description: 
 Notes: 
@@ -10,7 +15,8 @@
 2.6.24-etchnhalf-security: 2.6.24-4
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
-2.6.15-dapper-security: 
-2.6.17-edgy-security: ignored (EOL)
-2.6.20-feisty-security: 
-2.6.22-gutsy-security: 
+2.6.15-dapper-security: N/A
+2.6.17-edgy-security: released (2.6.17.1-12.44)
+2.6.20-feisty-security: released (2.6.20-16.35)
+2.6.22-gutsy-security: released (2.6.22-14.52)
+2.6.24-hardy-security: N/A

Modified: active/CVE-2008-1294
===================================================================
--- active/CVE-2008-1294	2008-05-07 19:43:47 UTC (rev 1162)
+++ active/CVE-2008-1294	2008-05-07 21:22:55 UTC (rev 1163)
@@ -6,6 +6,9 @@
  https://launchpad.net/bugs/107209
  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=419706
  http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=9926e4c74300c4b31dee007298c6475d33369df0
+ kees> for pre-2.6.17 kernels, two additional commits are needed:
+ kees>  ec9e16bacdba1da1ee15dd162384e22df5c87e09
+ kees>  e0661111e5441995f7a69dc4336c9f131cb9bc58
 Bugs: 
 upstream: 
 linux-2.6: 
@@ -13,7 +16,8 @@
 2.6.24-etchnhalf-security:
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
-2.6.15-dapper-security: 
+2.6.15-dapper-security: pending (2.6.15-51.67)
 2.6.17-edgy-security: ignored (EOL)
-2.6.20-feisty-security: 
-2.6.22-gutsy-security: 
+2.6.20-feisty-security: pending (2.6.20-16.36)
+2.6.22-gutsy-security: N/A
+2.6.24-hardy-security: N/A

Modified: active/CVE-2008-1375
===================================================================
--- active/CVE-2008-1375	2008-05-07 19:43:47 UTC (rev 1162)
+++ active/CVE-2008-1375	2008-05-07 21:22:55 UTC (rev 1163)
@@ -5,12 +5,15 @@
  http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=214b7049a7929f03bbd2786aaef04b8b79db34e2
 Ubuntu-Description: 
 Notes: 
+ kees> ABI changer due to header addition?
+ kees> http://svn.debian.org/wsvn/kernel/dists/etch-security/linux-2.6/debian/patches/bugfix/dnotify-race-avoid-abi-change.patch?op=file&rev=0&sc=0
 Bugs: 
 upstream: pending (2.6.26-rc1)
 linux-2.6: needed
 2.6.18-etch-security: released (2.6.18.dfsg.1-18etch2) [bugfix/dnotify-race.patch]
 2.6.24-etchnhalf-security: needed
-2.6.15-dapper-security: 
+2.6.15-dapper-security: pending (2.6.15-51.67)
 2.6.17-edgy-security: ignored (EOL)
-2.6.20-feisty-security: 
-2.6.22-gutsy-security: 
+2.6.20-feisty-security: pending (2.6.20-16.36)
+2.6.22-gutsy-security: pending (2.6.22-14.53)
+2.6.24-hardy-security: pending (2.6.24-17.32)

Modified: active/CVE-2008-1669
===================================================================
--- active/CVE-2008-1669	2008-05-07 19:43:47 UTC (rev 1162)
+++ active/CVE-2008-1669	2008-05-07 21:22:55 UTC (rev 1163)
@@ -5,12 +5,13 @@
 Ubuntu-Description: 
 Notes: 
  kees> http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=0b2bac2f1ea0d33a3621b27ca68b9ae760fca2e9
+ kees> linux-2.6.24.y: 0bbbae3bfd732f6c4d6b2a67121d77bf6b1c7f70
 Bugs: 
 upstream: 
 linux-2.6: 
 2.6.18-etch-security: 
 2.6.24-etchnhalf-security:
-2.6.15-dapper-security: needed
-2.6.20-feisty-security: needed
-2.6.22-gutsy-security: needed
-2.6.24-hardy-security: needed
+2.6.15-dapper-security: pending (2.6.15-51.67)
+2.6.20-feisty-security: pending (2.6.20-16.36)
+2.6.22-gutsy-security: pending (2.6.22-14.53)
+2.6.24-hardy-security: pending (2.6.24-17.32)




More information about the kernel-sec-discuss mailing list