r4615 - people/dannf
Dann Frazier
dannf at costa.debian.org
Sun Oct 23 16:01:16 UTC 2005
Author: dannf
Date: 2005-10-23 16:01:15 +0000 (Sun, 23 Oct 2005)
New Revision: 4615
Modified:
people/dannf/2.4.27-10sarge1
people/dannf/2.6.8-16sarge1.dsa
Log:
update w/ new CVE ids
Modified: people/dannf/2.4.27-10sarge1
===================================================================
--- people/dannf/2.4.27-10sarge1 2005-10-23 14:32:00 UTC (rev 4614)
+++ people/dannf/2.4.27-10sarge1 2005-10-23 16:01:15 UTC (rev 4615)
@@ -12,9 +12,10 @@
Vulnerability : multiple
Problem type : remote, local, DoS
Debian-specific: no
-CVE Id(s) : CAN-2005-1768 CAN-2005-0757 CAN-2005-1762 CAN-2005-0756
- CAN-2005-2456 CAN-2005-2801 CAN-2005-2872 CAN-2005-1767
- CAN-2005-2458 CAN-2005-2459
+CVE Id(s) : CAN-2005-1768 CAN-2005-0757 CAN-2005-1762
+ CAN-2005-0756 CAN-2005-3275 CAN-2005-2456
+ CAN-2005-2801 CAN-2005-2872 CAN-2005-1767
+ CAN-2005-2458 CAN-2005-2459 CAN-2005-2553
Multiple security vulnerabilities have been identified in the Linux 2.4 kernel.
These vulnerabilities could allow an attacker to execute arbitrary code or
@@ -49,10 +50,17 @@
platform, which allows local users to cause a denial of service (kernel
crash)
-NO-CAN (172_ppc32-time_offset-misuse.diff)
+NO-CAN (172_ppc32-time_offset-misuse.diff) - not believed to be a security issue
-CAN-REQUESTED (174_net-ipv4-netfilter-nat-mem.diff)
+CAN-2005-3275 (174_net-ipv4-netfilter-nat-mem.diff)
+ A potential memory corruption bug exists in the NAT code in Linux
+ kernels prior to 2.6.13 and 2.4.32-rc1. The portptr pointing to the
+ port in the conntrack tuple is declared static, which could result in
+ memory corruption when two packets of the same protocol are NATed at
+ the same time and one conntrack goes away. A malicious machine on the
+ same network could potentially use this to initiate a DoS attack.
+
CAN-2005-2456 (176_ipsec-array-overflow.diff)
Array index overflow in the xfrm_sk_policy_insert function in
@@ -96,5 +104,10 @@
compressed file that leads to a null pointer dereference, a different
vulnerability than CAN-2005-2458.
-CAN-REQUESTED (184_arch-x86_64-ia32-ptrace32-oops.diff)
+CAN-2005-2553 (184_arch-x86_64-ia32-ptrace32-oops.diff)
+ The find_target function in ptrace32.c in the Linux kernel 2.4.x
+ before 2.4.29 does not properly handle a NULL return value from another
+ function, which allows local users to cause a denial of service (kernel
+ crash/oops) by running a 32-bit ltrace program with the -i option on a 64-bit
+ executable program.
Modified: people/dannf/2.6.8-16sarge1.dsa
===================================================================
--- people/dannf/2.6.8-16sarge1.dsa 2005-10-23 14:32:00 UTC (rev 4614)
+++ people/dannf/2.6.8-16sarge1.dsa 2005-10-23 16:01:15 UTC (rev 4615)
@@ -17,7 +17,8 @@
CAN-2005-1265 CAN-2005-0757 CAN-2005-1765 CAN-2005-1761
CAN-2005-2548 CAN-2004-2302 CAN-2005-1767 CAN-2005-2458
CAN-2005-2459 CAN-2005-2456 CAN-2005-2872 CAN-2005-2801
- CAN-2005-3110
+ CAN-2005-3110 CAN-2005-3271 CAN-2005-3272 CAN-2005-3272
+ CAN-2005-3273 CAN-2005-3274 CAN-2005-3275 CAN-2005-3276
Multiple security vulnerabilities have been identified in the Linux kernel.
These vulnerabilities could allow an attacker to execute arbitrary code or
@@ -167,9 +168,13 @@
NO-CAN (arch-x86_64-kernel-smp-boot-race.dpatch)
-CAN-REQUESTED [fs-exec-posix-timers-leak-1.dpatch]
+CAN-2005-3271 [fs-exec-posix-timers-leak-1.dpatch]
- Make exec clean up posix timers.
+ Exec in Linux kernel 2.6 does not properly clear posix-timers in
+ multi-threaded environments, which results in a resource leak and
+ could allow a large number of multiple local users to cause a denial
+ of service by using more posix-timers than specified by the quota for
+ a single user.
NO-CAN [fs-exec-posix-timers-leak-2.dpatch]
@@ -180,34 +185,51 @@
NO-CAN [net-bridge-mangle-oops-1.dpatch]
NO-CAN [net-bridge-mangle-oops-2.dpatch]
-CAN-REQUESTED [net-bridge-forwarding-poison-1.dpatch]
-CAN-REQUESTED [net-bridge-forwarding-poison-2.dpatch]
+CAN-2005-3272 [net-bridge-forwarding-poison-1.dpatch]
+CAN-2005-3272 [net-bridge-forwarding-poison-2.dpatch]
- Avoid poisoning of the bridge forwarding table by frames that have been
- dropped by filtering. This prevents spoofed source addresses on hostile
- side of bridge from causing packet leakage, a small but possible
- security risk.
+ Linux kernel before 2.6.12 allows remote attackers to poison the
+ bridge forwarding table using frames that have already been dropped by
+ filtering, which can cause the bridge to forward spoofed packets.
+CAN-2005-3273 [net-rose-ndigis-verify.dpatch]
-CAN-REQUESTED [net-rose-ndigis-verify.dpatch]
+ The rose_rt_ioctl function in rose_route.c for ROSE in Linux 2.6
+ kernels prior to 2.6.12 does not properly verify the ndigis argument
+ for a new route, which allows attackers to trigger array out-of-bounds
+ errors with a large number of digipeats.
- Verify ndigis argument of a new route.
-
NO-CAN [sound-usb-usbaudio-unplug-oops.dpatch] - not believed to be a security issue
Prevent oops & dead keyboard on usb unplugging while the device is being
used.
-CAN-REQUESTED [net-ipv4-ipvs-conn_tab-race.dpatch]
+CAN-2005-3274 [net-ipv4-ipvs-conn_tab-race.dpatch]
- Fix race condition on ip_vs_conn_tab list modification
+ Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4
+ before 2.4.32-pre2, when running on SMP systems, allows local users to
+ cause a denial of service (null dereference) by causing a connection
+ timer to expire while the connection table is being flushed before the
+ appropriate lock is acquired.
NO-CAN [net-netlink-autobind-return.dpatch] not believed to be a security bug
NO-CAN [ppc32-time_offset-misuse.dpatch] not believed to be a security issue
-CAN-REQUESTED [netfilter-NAT-memory-corruption.dpatch]
+CAN-2005-3275 [netfilter-NAT-memory-corruption.dpatch]
+ The NAT code (1) ip_nat_proto_tcp.c and (2) ip_nat_proto_udp.c in
+ Linux kernel 2.6 before 2.6.13 and 2.4 before 2.4.32-rc1 incorrectly
+ declares a variable to be static, which allows remote attackers to
+ cause a denial of service (memory corruption) by causing two packets
+ for the same protocol to be NATed at the same time, which leads to
+ memory corruption.
+
NO-CAN [netfilter-ip_conntrack_untracked-refcount.dpatch]
-CAN-REQUESTED [sys_get_thread_area-leak.dpatch]
+CAN-2005-3276 [sys_get_thread_area-leak.dpatch]
+
+ The sys_get_thread_area function in process.c in Linux 2.6 before
+ 2.6.12.4 and 2.6.13 does not clear a data structure before copying it
+ to userspace, which might allow a user process to obtain sensitive
+ information.
More information about the Kernel-svn-changes
mailing list