[kernel-sec-discuss] r1287 - active

jmm at alioth.debian.org jmm at alioth.debian.org
Thu Jan 8 18:37:09 UTC 2009


Author: jmm
Date: 2009-01-08 18:37:09 +0000 (Thu, 08 Jan 2009)
New Revision: 1287

Added:
   active/CVE-2008-5700
   active/CVE-2008-5701
Log:
two new issues


Added: active/CVE-2008-5700
===================================================================
--- active/CVE-2008-5700	                        (rev 0)
+++ active/CVE-2008-5700	2009-01-08 18:37:09 UTC (rev 1287)
@@ -0,0 +1,21 @@
+Candidate: CVE-2008-5700
+Description:
+ libata in the Linux kernel before 2.6.27.9 does not set minimum
+ timeouts for SG_IO requests, which allows local usersto cause a
+ deniale (Programmed I/O mode on drives) via multiple simultaneous
+ invocations of an unspecified test program.
+References:
+ http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git;a=commit;h=f2f1fa78a155524b849edf359e42a3001ea652c0
+ https://bugzilla.redhat.com/show_bug.cgi?id=474495
+Ubuntu-Description:
+Notes:
+Bugs:
+upstream: released (2.6.27.9)
+linux-2.6: 
+2.6.18-etch-security:
+2.6.24-etch-security:
+2.6.26-lenny-security:
+2.6.15-dapper-security:
+2.6.22-gutsy-security:
+2.6.24-hardy-security:
+2.6.27-intrepid-security:

Added: active/CVE-2008-5701
===================================================================
--- active/CVE-2008-5701	                        (rev 0)
+++ active/CVE-2008-5701	2009-01-08 18:37:09 UTC (rev 1287)
@@ -0,0 +1,22 @@
+Candidate: CVE-2008-5701
+Description:
+ Array index error in arch/mips/kernel/scall64-o32.S in the Linux kernel
+ before 2.6.28-rc8 on 64-bit MIPS platforms allows local users to cause a
+ denial of service (system crash) via an o32 syscall with a small syscall
+ number, which leads to an attempted read operation outside the bounds of
+ the syscall table.
+References:
+ http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git;a=commit;h=e807f9574e37a3f202e677feaaad1b7c5d2c0db8
+ http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.28-rc8
+Ubuntu-Description:
+Notes:
+Bugs:
+upstream: released (2.6.28)
+linux-2.6: 
+2.6.18-etch-security:
+2.6.24-etch-security:
+2.6.26-lenny-security:
+2.6.15-dapper-security:
+2.6.22-gutsy-security:
+2.6.24-hardy-security:
+2.6.27-intrepid-security:




More information about the kernel-sec-discuss mailing list