[kernel-sec-discuss] r2287 - active

Moritz Muehlenhoff jmm at alioth.debian.org
Fri May 6 08:06:21 UTC 2011


Author: jmm
Date: 2011-05-06 08:06:11 +0000 (Fri, 06 May 2011)
New Revision: 2287

Added:
   active/CVE-2011-1767
   active/CVE-2011-1768
Removed:
   active/CVE-2010-inode-dereference
Log:
two new kernel issues
remove old temp entry, not a security issue


Deleted: active/CVE-2010-inode-dereference
===================================================================
--- active/CVE-2010-inode-dereference	2011-05-04 15:33:06 UTC (rev 2286)
+++ active/CVE-2010-inode-dereference	2011-05-06 08:06:11 UTC (rev 2287)
@@ -1,12 +0,0 @@
-Candidate:
-Description:
- inode dereference
-References:
-Notes:
- coding error (not sure if it would be exploitable)
-Bugs:
-upstream: released (2.6.34-rc6) [b338cc82]
-2.6.32-upstream-stable: released (2.6.32.13) [e3a126e62]
-linux-2.6: released (2.6.32-13) [bugfix/all/stable/2.6.32.13.patch]
-2.6.26-lenny-security:
-2.6.32-squeeze-security: released (2.6.32-13) [bugfix/all/stable/2.6.32.13.patch]

Added: active/CVE-2011-1767
===================================================================
--- active/CVE-2011-1767	                        (rev 0)
+++ active/CVE-2011-1767	2011-05-06 08:06:11 UTC (rev 2287)
@@ -0,0 +1,10 @@
+Candidate: CVE-2011-1767
+Description: remote oops if ip_gre is compiled as module and packet comes at unfortunate moment of module loading
+References:
+Notes:
+Bugs:
+upstream: released (2.6.34) [c2892f02712e9516d72841d5c019ed6916329794]
+2.6.32-upstream-stable: needed
+linux-2.6: released (2.6.34-1)
+2.6.26-lenny-security: needed
+2.6.32-squeeze-security: needed

Added: active/CVE-2011-1768
===================================================================
--- active/CVE-2011-1768	                        (rev 0)
+++ active/CVE-2011-1768	2011-05-06 08:06:11 UTC (rev 2287)
@@ -0,0 +1,10 @@
+Candidate: CVE-2011-1768
+Description: receive hook can be called before netns setup is done, oopsing in net_generic()
+References:
+Notes:
+Bugs:
+upstream: released (2.6.34) [d5aa407f59f5b83d2c50ec88f5bf56d40f1f8978]
+2.6.32-upstream-stable: needed
+linux-2.6: released (2.6.34-1)
+2.6.26-lenny-security: needed
+2.6.32-squeeze-security: needed




More information about the kernel-sec-discuss mailing list