[kernel-sec-discuss] r1485 - active

Michael Gilbert gilbert-guest at alioth.debian.org
Mon Sep 14 03:51:31 UTC 2009


Author: gilbert-guest
Date: 2009-09-14 03:51:30 +0000 (Mon, 14 Sep 2009)
New Revision: 1485

Added:
   active/CVE-2009-2903
   active/CVE-2009-3043
Removed:
   active/CVE-2009-need-to-flush-ldisc_halt
Log:
cve assigned and new issue

Added: active/CVE-2009-2903
===================================================================
--- active/CVE-2009-2903	                        (rev 0)
+++ active/CVE-2009-2903	2009-09-14 03:51:30 UTC (rev 1485)
@@ -0,0 +1,26 @@
+Candidate: CVE-2009-2903
+Description:
+ The check for the ipddpN device in the handle_ip_over_ddp() function 
+ returns -NODEV to the atalk_rcv() function when the device does not 
+ exist. The atalk_rcv() function then directly returns that value to its 
+ caller. There is a missing call to kfree_skb() in these unaccepted 
+ IP-DDP datagram that can exhaust the kernel memory eventually. It 
+ affects Linux hosts with appletalk and ipddp modules loaded, that are 
+ attached to the same link. Thanks to Mark Smith for reporting this issue 
+ to us.
+References:
+ http://git.kernel.org/?p=linux/kernel/git/davem/net-next-2.6.git;a=commit;h=ffcfb8db540ff879c2a85bf7e404954281443414
+ https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2903#c3
+ http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=blob;f=Documentation/networking/ipddp.txt;h=661a5558dd8e928f15771c07ef34b3ee9cb81e57;hb=HEAD
+Ubuntu-Description:
+Notes:
+Bugs:
+upstream: pending [ffcfb8db540ff879c2a85bf7e404954281443414]
+linux-2.6:
+2.6.18-etch-security:
+2.6.24-etch-security:
+2.6.26-lenny-security:
+2.6.15-dapper-security:
+2.6.22-gutsy-security:
+2.6.24-hardy-security:
+2.6.27-intrepid-security:

Copied: active/CVE-2009-3043 (from rev 1484, active/CVE-2009-need-to-flush-ldisc_halt)
===================================================================
--- active/CVE-2009-3043	                        (rev 0)
+++ active/CVE-2009-3043	2009-09-14 03:51:30 UTC (rev 1485)
@@ -0,0 +1,29 @@
+Candidate: requested on oss-sec
+Description:
+ The tty ldisc code was rewritten to use proper reference counts (commits 
+ 65b770468e98 and cbe9352fa08f) in order to avoid a race with hangup, but 
+ it also introduced another bug that can result in various problems such 
+ as a NULL pointer dereference in run_timer_softirq() or a BUG() in 
+ worker_thread. More info in the patch.
+References:
+ http://git.kernel.org/linus/5c58ceff103d8a654f24769bb1baaf84a841b0cc
+ http://lkml.org/lkml/2009/8/20/27
+ http://lkml.org/lkml/2009/8/20/68
+ http://lkml.org/lkml/2009/8/20/21
+Ubuntu-Description:
+Notes:
+ gilbert> supposedly only affects >2.6.26.  oss-sec note says:
+   I believe this affects kernel versions greater than v2.6.26. The code in 
+   drivers/char/tty_ldisc.c was from drivers/char/tty_io.c before it was 
+   splitted into its own file in v2.6.27-rc1 (commit 01e1abb2). I did not 
+   investigate further.
+Bugs:
+upstream: pending (2.6.31) [5c58ceff103d8a654f24769bb1baaf84a841b0cc]
+linux-2.6: needed
+2.6.18-etch-security:
+2.6.24-etch-security:
+2.6.26-lenny-security:
+2.6.15-dapper-security:
+2.6.22-gutsy-security:
+2.6.24-hardy-security:
+2.6.27-intrepid-security:

Deleted: active/CVE-2009-need-to-flush-ldisc_halt
===================================================================
--- active/CVE-2009-need-to-flush-ldisc_halt	2009-09-08 21:47:13 UTC (rev 1484)
+++ active/CVE-2009-need-to-flush-ldisc_halt	2009-09-14 03:51:30 UTC (rev 1485)
@@ -1,29 +0,0 @@
-Candidate: requested on oss-sec
-Description:
- The tty ldisc code was rewritten to use proper reference counts (commits 
- 65b770468e98 and cbe9352fa08f) in order to avoid a race with hangup, but 
- it also introduced another bug that can result in various problems such 
- as a NULL pointer dereference in run_timer_softirq() or a BUG() in 
- worker_thread. More info in the patch.
-References:
- http://git.kernel.org/linus/5c58ceff103d8a654f24769bb1baaf84a841b0cc
- http://lkml.org/lkml/2009/8/20/27
- http://lkml.org/lkml/2009/8/20/68
- http://lkml.org/lkml/2009/8/20/21
-Ubuntu-Description:
-Notes:
- gilbert> supposedly only affects >2.6.26.  oss-sec note says:
-   I believe this affects kernel versions greater than v2.6.26. The code in 
-   drivers/char/tty_ldisc.c was from drivers/char/tty_io.c before it was 
-   splitted into its own file in v2.6.27-rc1 (commit 01e1abb2). I did not 
-   investigate further.
-Bugs:
-upstream: pending (2.6.31) [5c58ceff103d8a654f24769bb1baaf84a841b0cc]
-linux-2.6: needed
-2.6.18-etch-security:
-2.6.24-etch-security:
-2.6.26-lenny-security:
-2.6.15-dapper-security:
-2.6.22-gutsy-security:
-2.6.24-hardy-security:
-2.6.27-intrepid-security:




More information about the kernel-sec-discuss mailing list