[kernel-sec-discuss] r1622 - / active retired
Moritz Muehlenhoff
jmm at alioth.debian.org
Tue Dec 1 22:42:07 UTC 2009
Author: jmm
Date: 2009-12-01 22:42:07 +0000 (Tue, 01 Dec 2009)
New Revision: 1622
Added:
CVE-2004-2135
retired/CVE-2004-2136
Removed:
active/CVE-2004-2135
active/CVE-2004-2136
Modified:
active/CVE-2009-2691
Log:
retire historic crypto disk issues
Copied: CVE-2004-2135 (from rev 1621, active/CVE-2004-2135)
===================================================================
--- CVE-2004-2135 (rev 0)
+++ CVE-2004-2135 2009-12-01 22:42:07 UTC (rev 1622)
@@ -0,0 +1,17 @@
+Candidate: CVE-2004-2135
+Description:
+ cryptoloop on Linux kernel 2.6.x, when used on certain file systems with a block
+ size 1024 or greater, has certain "IV computation" weaknesses that allow watermarked
+ files to be detected without decryption.
+References:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2135
+ http://marc.theaimsgroup.com/?l=linux-kernel&m=107719798631935&w=2
+ http://mareichelt.de/pub/notmine/diskenc.pdf
+ http://www.securiteam.com/exploits/5UP0P1PFPM.html
+Notes:
+Bugs:
+upstream:
+linux-2.6:
+2.6.18-etch-security:
+2.6.24-etch-security:
+2.6.26-lenny-security:
Deleted: active/CVE-2004-2135
===================================================================
--- active/CVE-2004-2135 2009-12-01 14:10:31 UTC (rev 1621)
+++ active/CVE-2004-2135 2009-12-01 22:42:07 UTC (rev 1622)
@@ -1,17 +0,0 @@
-Candidate: CVE-2004-2135
-Description:
- cryptoloop on Linux kernel 2.6.x, when used on certain file systems with a block
- size 1024 or greater, has certain "IV computation" weaknesses that allow watermarked
- files to be detected without decryption.
-References:
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2135
- http://marc.theaimsgroup.com/?l=linux-kernel&m=107719798631935&w=2
- http://mareichelt.de/pub/notmine/diskenc.pdf
- http://www.securiteam.com/exploits/5UP0P1PFPM.html
-Notes:
-Bugs:
-upstream:
-linux-2.6:
-2.6.18-etch-security:
-2.6.24-etch-security:
-2.6.26-lenny-security:
Deleted: active/CVE-2004-2136
===================================================================
--- active/CVE-2004-2136 2009-12-01 14:10:31 UTC (rev 1621)
+++ active/CVE-2004-2136 2009-12-01 22:42:07 UTC (rev 1622)
@@ -1,17 +0,0 @@
-Candidate: CVE-2004-2136
-Description:
- dm-crypt on Linux kernel 2.6.x, when used on certain file systems with a block size
- 1024 or greater, has certain "IV computation" weaknesses that allow watermarked
- files to be detected without decryption.
-References:
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2136
- http://marc.theaimsgroup.com/?l=linux-kernel&m=107719798631935&w=2
- http://mareichelt.de/pub/notmine/diskenc.pdf
- http://www.securiteam.com/exploits/5UP0P1PFPM.html
-Notes:
-Bugs:
-upstream:
-linux-2.6:
-2.6.18-etch-security:
-2.6.24-etch-security:
-2.6.26-lenny-security:
Modified: active/CVE-2009-2691
===================================================================
--- active/CVE-2009-2691 2009-12-01 14:10:31 UTC (rev 1621)
+++ active/CVE-2009-2691 2009-12-01 22:42:07 UTC (rev 1622)
@@ -14,7 +14,3 @@
2.6.18-etch-security: ignored (2.6.18.dfsg.1-24etch4) "needs port"
2.6.24-etch-security:
2.6.26-lenny-security: ignored (2.6.26-19) "needs port"
-2.6.15-dapper-security:
-2.6.22-gutsy-security:
-2.6.24-hardy-security:
-2.6.27-intrepid-security:
Copied: retired/CVE-2004-2136 (from rev 1621, active/CVE-2004-2136)
===================================================================
--- retired/CVE-2004-2136 (rev 0)
+++ retired/CVE-2004-2136 2009-12-01 22:42:07 UTC (rev 1622)
@@ -0,0 +1,17 @@
+Candidate: CVE-2004-2136
+Description:
+ dm-crypt on Linux kernel 2.6.x, when used on certain file systems with a block size
+ 1024 or greater, has certain "IV computation" weaknesses that allow watermarked
+ files to be detected without decryption.
+References:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2136
+ http://marc.theaimsgroup.com/?l=linux-kernel&m=107719798631935&w=2
+ http://mareichelt.de/pub/notmine/diskenc.pdf
+ http://www.securiteam.com/exploits/5UP0P1PFPM.html
+Notes:
+Bugs:
+upstream:
+linux-2.6:
+2.6.18-etch-security:
+2.6.24-etch-security:
+2.6.26-lenny-security:
More information about the kernel-sec-discuss
mailing list