[kernel-sec-discuss] r1653 - active retired
Michael Gilbert
gilbert-guest at alioth.debian.org
Tue Dec 15 23:02:53 UTC 2009
Author: gilbert-guest
Date: 2009-12-15 23:02:14 +0000 (Tue, 15 Dec 2009)
New Revision: 1653
Added:
retired/CVE-2009-1298
retired/CVE-2009-2287
retired/CVE-2009-2584
Removed:
active/CVE-2009-1298
active/CVE-2009-2287
active/CVE-2009-2584
Log:
retire a few issues
Deleted: active/CVE-2009-1298
===================================================================
--- active/CVE-2009-1298 2009-12-15 03:59:30 UTC (rev 1652)
+++ active/CVE-2009-1298 2009-12-15 23:02:14 UTC (rev 1653)
@@ -1,14 +0,0 @@
-Candidate:
-Description:
- ipv4 denial-of-sevice
-References:
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=bbf31bf18d34caa87dd01f08bf713635593697f2
-Notes:
-Bugs:
-upstream: released (2.6.32) [bbf31bf1]
-2.6.31-upstream-stable:
-linux-2.6: released (2.6.32-1)
-2.6.18-etch-security: N/A "introduced in 2.6.29 commit 2bad35b7"
-2.6.24-etch-security: N/A "introduced in 2.6.29 commit 2bad35b7"
-2.6.26-lenny-security: N/A "introduced in 2.6.29 commit 2bad35b7"
-2.6.32-squeeze-security: released (2.6.32-1)
Deleted: active/CVE-2009-2287
===================================================================
--- active/CVE-2009-2287 2009-12-15 03:59:30 UTC (rev 1652)
+++ active/CVE-2009-2287 2009-12-15 23:02:14 UTC (rev 1653)
@@ -1,19 +0,0 @@
-Candidate: CVE-2009-2287
-Description:
-References:
- http://www.openwall.com/lists/oss-security/2009/06/30/1
- http://git.kernel.org/?p=linux/kernel/git/stable/stable-queue.git;a=blob;f=queue-2.6.30/kvm-x86-check-for-cr3-validity-in-ioctl_set_sregs.patch;h=b48a47dad2cf76358b327368f80c0805e6370c68;hb=e7c45b24f298b5d9efd7d401150f64a1b51aaac4
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=59839dfff5eabca01cc4e20b45797a60a80af8cb
- http://sourceforge.net/tracker/?func=detail&atid=893831&aid=2687641&group_id=180599
-Ubuntu-Description:
-Notes:
-Bugs:
-upstream: released (2.6.30.1, 2.6.31-rc1)
-linux-2.6: released (2.6.30-2) [bugfix/all/stable/2.6.30.1.patch]
-2.6.18-etch-security: N/A "no kvm"
-2.6.24-etch-security:
-2.6.26-lenny-security: released (2.6.26-17lenny1) [bugfix/x86/kvm-check-for-cr3-validity-in-ioctl_set_sregs.patch]
-2.6.15-dapper-security:
-2.6.22-gutsy-security:
-2.6.24-hardy-security:
-2.6.27-intrepid-security:
Deleted: active/CVE-2009-2584
===================================================================
--- active/CVE-2009-2584 2009-12-15 03:59:30 UTC (rev 1652)
+++ active/CVE-2009-2584 2009-12-15 23:02:14 UTC (rev 1653)
@@ -1,22 +0,0 @@
-Candidate: CVE-2009-2584
-Description:
- Off-by-one error in the options_write function in
- drivers/misc/sgi-gru/gruprocfs.c in the SGI GRU driver in the Linux kernel
- 2.6.30.2 and earlier on ia64 and x86 platforms might allow local users to
- overwrite arbitrary memory locations and gain privileges via a crafted count
- argument, which triggers a stack-based buffer overflow.
-References:
- http://grsecurity.net/~spender/exploit_demo.c
- http://lkml.org/lkml/2009/7/20/348
- http://xorl.wordpress.com/2009/07/21/linux-kernel-sgi-gru-driver-off-by-one-overwrite
-Ubuntu-Description:
-Notes:
- - high urgency since exploit code is currently in the wild
- - the patch is still not applied upstream so i've sent a message upstream to lkml:
- http://lkml.org/lkml/2009/11/4/538
-Bugs:
-upstream: released (2.6.32-rc7) [d39b7dd1dcbf394a1cb897457c862dafe9a20ac5], released (2.6.31.6) [42d7bdfc3320039bb9310703d6475a62f5c74772]
-linux-2.6: released (2.6.31-2)
-2.6.18-etch-security: N/A "code not present"
-2.6.24-etch-security: N/A "code not present"
-2.6.26-lenny-security: N/A "code not present"
Copied: retired/CVE-2009-1298 (from rev 1652, active/CVE-2009-1298)
===================================================================
--- retired/CVE-2009-1298 (rev 0)
+++ retired/CVE-2009-1298 2009-12-15 23:02:14 UTC (rev 1653)
@@ -0,0 +1,14 @@
+Candidate:
+Description:
+ ipv4 denial-of-sevice
+References:
+ http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=bbf31bf18d34caa87dd01f08bf713635593697f2
+Notes:
+Bugs:
+upstream: released (2.6.32) [bbf31bf1]
+2.6.31-upstream-stable:
+linux-2.6: released (2.6.32-1)
+2.6.18-etch-security: N/A "introduced in 2.6.29 commit 2bad35b7"
+2.6.24-etch-security: N/A "introduced in 2.6.29 commit 2bad35b7"
+2.6.26-lenny-security: N/A "introduced in 2.6.29 commit 2bad35b7"
+2.6.32-squeeze-security: released (2.6.32-1)
Copied: retired/CVE-2009-2287 (from rev 1652, active/CVE-2009-2287)
===================================================================
--- retired/CVE-2009-2287 (rev 0)
+++ retired/CVE-2009-2287 2009-12-15 23:02:14 UTC (rev 1653)
@@ -0,0 +1,15 @@
+Candidate: CVE-2009-2287
+Description:
+References:
+ http://www.openwall.com/lists/oss-security/2009/06/30/1
+ http://git.kernel.org/?p=linux/kernel/git/stable/stable-queue.git;a=blob;f=queue-2.6.30/kvm-x86-check-for-cr3-validity-in-ioctl_set_sregs.patch;h=b48a47dad2cf76358b327368f80c0805e6370c68;hb=e7c45b24f298b5d9efd7d401150f64a1b51aaac4
+ http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=59839dfff5eabca01cc4e20b45797a60a80af8cb
+ http://sourceforge.net/tracker/?func=detail&atid=893831&aid=2687641&group_id=180599
+Ubuntu-Description:
+Notes:
+Bugs:
+upstream: released (2.6.30.1, 2.6.31-rc1)
+linux-2.6: released (2.6.30-2) [bugfix/all/stable/2.6.30.1.patch]
+2.6.18-etch-security: N/A "no kvm"
+2.6.24-etch-security: N/A "kvm introduced in 2.6.25"
+2.6.26-lenny-security: released (2.6.26-17lenny1) [bugfix/x86/kvm-check-for-cr3-validity-in-ioctl_set_sregs.patch]
Copied: retired/CVE-2009-2584 (from rev 1652, active/CVE-2009-2584)
===================================================================
--- retired/CVE-2009-2584 (rev 0)
+++ retired/CVE-2009-2584 2009-12-15 23:02:14 UTC (rev 1653)
@@ -0,0 +1,22 @@
+Candidate: CVE-2009-2584
+Description:
+ Off-by-one error in the options_write function in
+ drivers/misc/sgi-gru/gruprocfs.c in the SGI GRU driver in the Linux kernel
+ 2.6.30.2 and earlier on ia64 and x86 platforms might allow local users to
+ overwrite arbitrary memory locations and gain privileges via a crafted count
+ argument, which triggers a stack-based buffer overflow.
+References:
+ http://grsecurity.net/~spender/exploit_demo.c
+ http://lkml.org/lkml/2009/7/20/348
+ http://xorl.wordpress.com/2009/07/21/linux-kernel-sgi-gru-driver-off-by-one-overwrite
+Ubuntu-Description:
+Notes:
+ - high urgency since exploit code is currently in the wild
+ - the patch is still not applied upstream so i've sent a message upstream to lkml:
+ http://lkml.org/lkml/2009/11/4/538
+Bugs:
+upstream: released (2.6.32-rc7) [d39b7dd1dcbf394a1cb897457c862dafe9a20ac5], released (2.6.31.6) [42d7bdfc3320039bb9310703d6475a62f5c74772]
+linux-2.6: released (2.6.31-2)
+2.6.18-etch-security: N/A "code not present"
+2.6.24-etch-security: N/A "code not present"
+2.6.26-lenny-security: N/A "code not present"
More information about the kernel-sec-discuss
mailing list