r4352 - in people: . dannf

Dann Frazier dannf at costa.debian.org
Fri Oct 7 19:37:04 UTC 2005


Author: dannf
Date: 2005-10-07 19:37:04 +0000 (Fri, 07 Oct 2005)
New Revision: 4352

Added:
   people/dannf/
   people/dannf/2.6.8-16sarge1.dsa
Log:
i'll work on the dsa text here


Added: people/dannf/2.6.8-16sarge1.dsa
===================================================================
--- people/dannf/2.6.8-16sarge1.dsa	2005-10-07 13:58:07 UTC (rev 4351)
+++ people/dannf/2.6.8-16sarge1.dsa	2005-10-07 19:37:04 UTC (rev 4352)
@@ -0,0 +1,165 @@
+Packages       : kernel-source-2.6.8
+		 kernel-image-2.6.8-alpha
+		 kernel-image-2.6.8-amd64
+		 kernel-image-2.6.8-hppa
+		 kernel-image-2.6.8-i386
+		 kernel-image-2.6.8-ia64
+		 kernel-image-2.6.8-m68k
+		 kernel-image-2.6.8-s390
+		 kernel-image-2.6.8-sparc
+		 kernel-patch-2.6.8-powerpc
+Vulnerability  : multiple
+Problem type   : remote, local, DoS
+Debian-specific: no
+CVE Id(s)      : CAN-2005-3105 CAN-2005-1763 CAN-2005-1762 CAN-2005-0756
+		 CAN-2005-3108 CAN-2005-3106 CAN-2005-3107 CAN-2005-3109
+		 CAN-2005-1265 CAN-2005-0757 CAN-2005-1765 CAN-2005-1761
+		 CAN-2005-2548 CAN-2004-2302 CAN-2005-1767 CAN-2005-2458
+		 CAN-2005-2459 CAN-2005-2456 CAN-2005-2872 CAN-2005-2801
+		 CAN-2005-3110
+
+Multiple security vulnerabilities have been identified in the Linux kernel.
+These vulnerabilities could allow an attacker to execute arbitrary code or
+initiate a denial of service (DoS) attack.
+
+
+CAN-2005-3105
+
+	The mprotect code (mprotect.c) in Linux 2.6 on Itanium IA64 Montecito
+	processors does not properly maintain cache coherency as required by
+	the architecture, which allows local users to cause a denial of service
+	and possibly corrupt data by modifying PTE protections.
+
+CAN-2005-1763
+
+	Buffer overflow in ptrace in the Linux Kernel for 64-bit architectures
+	allows local users to write bytes into kernel memory.
+
+CAN-2005-1762
+
+	The ptrace call in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64
+	platform allows local users to cause a denial of service (kernel crash)
+	via a "non-canonical" address.
+
+CAN-2005-0756
+
+	ptrace 2.6.8.1 does not properly verify addresses on the amd64
+	platform, which allows local users to cause a denial of service (kernel
+	crash)
+
+CAN-2005-3108
+
+	mm/ioremap.c in Linux 2.6 on 64-bit x86 systems allows local users to
+	cause a denial of service or an information leak via an iremap on a
+	certain memory map that causes the iounmap to perform a lookup of a
+	page that does not exist.
+
+CAN-2005-3106
+
+	Race condition in Linux 2.6, when threads are sharing memory mapping
+	via CLONE_VM (such as linuxthreads and vfork), might allow local users
+	to cause a denial of service (deadlock) by triggering a core dump while
+	waiting for a thread that has just performed an exec.
+
+CAN-2005-3107
+
+	fs/exec.c in Linux 2.6, when one thread is tracing another thread that
+	shares the same memory map, might allow local users to cause a denial
+	of service (deadlock) by forcing a core dump when the traced thread is
+	in the TASK_TRACED state.
+
+CAN-2005-3109
+
+	The HFS and HFS+ (hfsplus) modules in Linux 2.6 allows attackers to
+	cause a denial of service (oops) by using hfsplus to mount a filesystem
+	that is not hfsplus.
+
+CAN-2005-1265
+
+	The mmap function in the Linux Kernel 2.6.10 can be used to create
+	memory maps with a start address beyond the end address, which allows
+	local users to cause a denial of service (kernel crash).
+
+CAN-2005-0757
+
+	The xattr file system code, as backported in Red Hat Enterprise Linux 3
+	on 64-bit systems, does not properly handle certain offsets, which
+	allows local users to cause a denial of service (system crash) via
+	certain actions on an ext3 file system with extended attributes
+	enabled.
+
+CAN-2005-1765
+
+	syscall in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform,
+	when running in 32-bit compatibility mode, allows local users to cause
+	a denial of service (kernel hang) via crafted arguments.
+
+CAN-2005-1761
+
+	Linux kernel 2.6 and 2.4 on the IA64 architecture allows local users to
+	cause a denial of service (kernel crash) via ptrace and the
+	restore_sigcontext function.
+
+CAN-2005-2548
+
+	vlan_dev.c in Linux kernel 2.6.8 allows remote attackers to cause a
+	denial of service (kernel oops from null dereference) via certain UDP
+	packets that lead to a function call with the wrong argument, as
+	demonstrated using snmpwalk on snmpd.
+
+CAN-2004-2302
+
+	Race condition in the sysfs_read_file and sysfs_write_file functions in
+	Linux kernel before 2.6.10 allows local users to read kernel memory and
+	cause a denial of service (crash) via large offsets in sysfs files.
+
+CAN-2005-1767
+
+	traps.c in the Linux kernel 2.6.x and 2.4.x executes stack segment
+	faults on an exception stack, which allows local users to cause a
+	denial of service (oops and stack fault exception).
+
+CAN-2005-2458
+
+	inflate.c in the zlib routines in the Linux kernel before 2.6.12.5
+	allows remote attackers to cause a denial of service (kernel crash) via
+	a compressed file with "improper tables".
+
+CAN-2005-2459
+
+	The huft_build function in inflate.c in the zlib routines in the Linux
+	kernel before 2.6.12.5 returns the wrong value, which allows remote
+	attackers to cause a denial of service (kernel crash) via a certain
+	compressed file that leads to a null pointer dereference, a different
+	vulnerability than CAN-2005-2458.
+
+CAN-2005-2456
+
+	Array index overflow in the xfrm_sk_policy_insert function in
+	xfrm_user.c in Linux kernel 2.6 allows local users to cause a denial of
+	service (oops or deadlock) and possibly execute arbitrary code via a
+	p->dir value that is larger than XFRM_POLICY_OUT, which is used as an
+	index in the sock->sk_policy array.
+
+CAN-2005-2872
+
+	The ipt_recent kernel module (ipt_recent.c) in Linux kernel before
+	2.6.12, when running on 64-bit processors such as AMD64, allows remote
+	attackers to cause a denial of service (kernel panic) via certain
+	attacks such as SSH brute force, which leads to memset calls using a
+	length based on the u_int32_t type, acting on an array of unsigned long
+	elements, a different vulnerability than CAN-2005-2873.
+
+CAN-2005-2801
+
+	xattr.c in the ext2 and ext3 file system code for Linux kernel 2.6 does
+	not properly compare the name_index fields when sharing xattr blocks,
+	which could prevent default ACLs from being applied.
+
+CAN-2005-3110
+
+	Race condition in ebtables netfilter module (ebtables.c) in Linux 2.6,
+	when running on an SMP system that is operating under a heavy load,
+	might allow remote attackers to cause a denial of service (crash) via
+	a series of packets that cause a value to be modified after it has been
+	read but before it has been locked.




More information about the Kernel-svn-changes mailing list