[kernel-sec-discuss] r2456 - active retired

Moritz Muehlenhoff jmm at alioth.debian.org
Sat Aug 20 21:07:16 UTC 2011


Author: jmm
Date: 2011-08-20 21:07:15 +0000 (Sat, 20 Aug 2011)
New Revision: 2456

Added:
   retired/CVE-2010-2943
   retired/CVE-2011-1019
Removed:
   active/CVE-2010-2943
   active/CVE-2011-1019
Log:
retire two issues


Deleted: active/CVE-2010-2943
===================================================================
--- active/CVE-2010-2943	2011-08-20 21:04:47 UTC (rev 2455)
+++ active/CVE-2010-2943	2011-08-20 21:07:15 UTC (rev 2456)
@@ -1,14 +0,0 @@
-Candidate: CVE-2010-2943
-Description:
- xfs leak due to filehandle conversion issue
-References:
- http://www.openwall.com/lists/oss-security/2010/08/18/2
-Notes:
- also need regression fix (not commited yet):
- http://oss.sgi.com/archives/xfs/2010-08/msg00179.html
-Bugs:
-upstream: release (2.6.35) [7dce11db,7124fe0a,1920779e,7b6259e7]
-2.6.32-upstream-stable: released (2.6.32.30)
-sid: released (2.6.37-1) [bugfix/all/xfs-always-use-iget-in-bulkstat.patch, bugfix/all/xfs-validate-untrusted-inode-numbers-during-lookup.patch, bugfix/all/xfs-rename-XFS_IGET_BULKSTAT-to-XFS_IGET_UNTRUSTED.patch, bugfix/all/xfs-remove-block-number-from-inode-lookup-code.patch, bugfix/all/xfs-fix-untrusted-inode-number-lookup.patch]
-2.6.26-lenny-security: ignored "backport too complex/risky for little risk"
-2.6.32-squeeze-security: released (2.6.32-31) [bugfix/all/xfs-always-use-iget-in-bulkstat.patch, bugfix/all/xfs-validate-untrusted-inode-numbers-during-lookup.patch, bugfix/all/xfs-rename-XFS_IGET_BULKSTAT-to-XFS_IGET_UNTRUSTED.patch, bugfix/all/xfs-remove-block-number-from-inode-lookup-code.patch, bugfix/all/xfs-fix-untrusted-inode-number-lookup.patch]

Deleted: active/CVE-2011-1019
===================================================================
--- active/CVE-2011-1019	2011-08-20 21:04:47 UTC (rev 2455)
+++ active/CVE-2011-1019	2011-08-20 21:07:15 UTC (rev 2456)
@@ -1,14 +0,0 @@
-Candidate: CVE-2011-1019
-Description:
- https://lkml.org/lkml/2011/2/24/203
-References:
-Notes:
- jmm> We won't fix this for Squeeze. This only applies to non-standard setups with fine
- jmm> grained security capability models, and an attacker can only load modules from
- jmm> /lib/modules, which is only writable with root privs
-Bugs:
-upstream: released (2.6.38) [8909c9ad8ff03611c9c96c9a92656213e4bb495b, 6dfbd87a20a737641ef228230c77f4262434fa24]
-2.6.32-upstream-stable: released (2.6.32.33)
-sid: released (2.6.38-1)
-2.6.26-lenny-security: N/A "Introduced in 2.6.32 with commit a8f80e8ff94ecba629542d9b4b5f5a8ee3eb565c"
-2.6.32-squeeze-security: ignored 

Copied: retired/CVE-2010-2943 (from rev 2455, active/CVE-2010-2943)
===================================================================
--- retired/CVE-2010-2943	                        (rev 0)
+++ retired/CVE-2010-2943	2011-08-20 21:07:15 UTC (rev 2456)
@@ -0,0 +1,14 @@
+Candidate: CVE-2010-2943
+Description:
+ xfs leak due to filehandle conversion issue
+References:
+ http://www.openwall.com/lists/oss-security/2010/08/18/2
+Notes:
+ also need regression fix (not commited yet):
+ http://oss.sgi.com/archives/xfs/2010-08/msg00179.html
+Bugs:
+upstream: release (2.6.35) [7dce11db,7124fe0a,1920779e,7b6259e7]
+2.6.32-upstream-stable: released (2.6.32.30)
+sid: released (2.6.37-1) [bugfix/all/xfs-always-use-iget-in-bulkstat.patch, bugfix/all/xfs-validate-untrusted-inode-numbers-during-lookup.patch, bugfix/all/xfs-rename-XFS_IGET_BULKSTAT-to-XFS_IGET_UNTRUSTED.patch, bugfix/all/xfs-remove-block-number-from-inode-lookup-code.patch, bugfix/all/xfs-fix-untrusted-inode-number-lookup.patch]
+2.6.26-lenny-security: ignored "backport too complex/risky for little risk"
+2.6.32-squeeze-security: released (2.6.32-31) [bugfix/all/xfs-always-use-iget-in-bulkstat.patch, bugfix/all/xfs-validate-untrusted-inode-numbers-during-lookup.patch, bugfix/all/xfs-rename-XFS_IGET_BULKSTAT-to-XFS_IGET_UNTRUSTED.patch, bugfix/all/xfs-remove-block-number-from-inode-lookup-code.patch, bugfix/all/xfs-fix-untrusted-inode-number-lookup.patch]

Copied: retired/CVE-2011-1019 (from rev 2455, active/CVE-2011-1019)
===================================================================
--- retired/CVE-2011-1019	                        (rev 0)
+++ retired/CVE-2011-1019	2011-08-20 21:07:15 UTC (rev 2456)
@@ -0,0 +1,14 @@
+Candidate: CVE-2011-1019
+Description:
+ https://lkml.org/lkml/2011/2/24/203
+References:
+Notes:
+ jmm> We won't fix this for Squeeze. This only applies to non-standard setups with fine
+ jmm> grained security capability models, and an attacker can only load modules from
+ jmm> /lib/modules, which is only writable with root privs
+Bugs:
+upstream: released (2.6.38) [8909c9ad8ff03611c9c96c9a92656213e4bb495b, 6dfbd87a20a737641ef228230c77f4262434fa24]
+2.6.32-upstream-stable: released (2.6.32.33)
+sid: released (2.6.38-1)
+2.6.26-lenny-security: N/A "Introduced in 2.6.32 with commit a8f80e8ff94ecba629542d9b4b5f5a8ee3eb565c"
+2.6.32-squeeze-security: ignored 




More information about the kernel-sec-discuss mailing list