[kernel-sec-discuss] r1635 - active ignored retired

Michael Gilbert gilbert-guest at alioth.debian.org
Sat Dec 5 03:59:03 UTC 2009


Author: gilbert-guest
Date: 2009-12-05 03:59:03 +0000 (Sat, 05 Dec 2009)
New Revision: 1635

Added:
   retired/CVE-2004-2136
Removed:
   active/CVE-2004-2136
   ignored/CVE-2004-2136
Log:
retire dm-crypt issue

Deleted: active/CVE-2004-2136
===================================================================
--- active/CVE-2004-2136	2009-12-05 03:12:33 UTC (rev 1634)
+++ active/CVE-2004-2136	2009-12-05 03:59:03 UTC (rev 1635)
@@ -1,22 +0,0 @@
-Candidate: CVE-2004-2136
-Description:
- dm-crypt on Linux kernel 2.6.x, when used on certain file systems with a block size 
- 1024 or greater, has certain "IV computation" weaknesses that allow watermarked
- files to be detected without decryption.
-References:
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2135
- http://mareichelt.de/pub/notmine/diskenc.pdf
- http://mareichelt.de/pub/texts.cryptoloop.php?alt_styles=2
-Notes:
- - i am 99% sure that these issues still affect the latest kernels
- - debian-installer only supports loop-aes and dm-crypt (i believe),
-   which are known to be not affected by these issues, so most users
-   are not affected
- - perhaps a solution would be to disable cryptoloop?
- - i have started an lkml thread: http://lkml.org/lkml/2009/12/2/232
-Bugs:
-upstream:
-linux-2.6:
-2.6.18-etch-security:
-2.6.24-etch-security:
-2.6.26-lenny-security:

Deleted: ignored/CVE-2004-2136
===================================================================
--- ignored/CVE-2004-2136	2009-12-05 03:12:33 UTC (rev 1634)
+++ ignored/CVE-2004-2136	2009-12-05 03:59:03 UTC (rev 1635)
@@ -1,20 +0,0 @@
-Candidate: CVE-2004-2136
-References: 
- http://marc.theaimsgroup.com/?l=linux-kernel&m=107719798631935&w=2
- http://mareichelt.de/pub/notmine/diskenc.pdf
- http://www.securiteam.com/exploits/5UP0P1PFPM.html
-Description: 
- dm-crypt on Linux kernel 2.6.x, when used on certain file systems with a
- block size 1024 or greater, has certain "IV computation" weaknesses that
- allow watermarked files to be detected without decryption.
-Notes: 
- jmm> IIRC there was some serious flaming about the different disk encryption systems,
- jmm> I'm not sure whether this has been addressed or how real it is
- jmm> 2.4 doesn't have dm-crypt, though
-Bugs: 
-upstream: 
-linux-2.6:
-2.6.8-sarge-security: ignored (2.6.8-16sarge5)
-2.4.27-sarge-security: N/A
-2.6.18-etch-security: ignored
-

Copied: retired/CVE-2004-2136 (from rev 1634, active/CVE-2004-2136)
===================================================================
--- retired/CVE-2004-2136	                        (rev 0)
+++ retired/CVE-2004-2136	2009-12-05 03:59:03 UTC (rev 1635)
@@ -0,0 +1,18 @@
+Candidate: CVE-2004-2136
+Description:
+ dm-crypt on Linux kernel 2.6.x, when used on certain file systems with a block size 
+ 1024 or greater, has certain "IV computation" weaknesses that allow watermarked
+ files to be detected without decryption.
+References:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2135
+ http://mareichelt.de/pub/notmine/diskenc.pdf
+ http://mareichelt.de/pub/texts.cryptoloop.php?alt_styles=2
+Notes:
+ a bunch of patches were applied to 2.6.10 to address the "IV computation" weakness.
+ see: http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.10
+Bugs:
+upstream: released (2.6.10)
+linux-2.6: released (2.6.10-1)
+2.6.18-etch-security: N/A "fixed in 2.6.10"
+2.6.24-etch-security: N/A "fixed in 2.6.10"
+2.6.26-lenny-security: N/A "fixed in 2.6.10"




More information about the kernel-sec-discuss mailing list