r4679 - in people/horms/patch_notes: 2.6-stable cve

Simon Horman horms at costa.debian.org
Fri Oct 28 09:17:39 UTC 2005


Author: horms
Date: 2005-10-28 09:17:38 +0000 (Fri, 28 Oct 2005)
New Revision: 4679

Added:
   people/horms/patch_notes/cve/CAN-2005-3181
   people/horms/patch_notes/cve/plug-names_cache-memleak.dpatch
Modified:
   people/horms/patch_notes/2.6-stable/2.6.13.4
   people/horms/patch_notes/cve/setkeys-needs-root.patch
Log:
CAN-2005-3181

Modified: people/horms/patch_notes/2.6-stable/2.6.13.4
===================================================================
--- people/horms/patch_notes/2.6-stable/2.6.13.4	2005-10-28 09:00:24 UTC (rev 4678)
+++ people/horms/patch_notes/2.6-stable/2.6.13.4	2005-10-28 09:17:38 UTC (rev 4679)
@@ -65,7 +65,7 @@
  * [SECURITY] Avoid 'names_cache' memory leak with CONFIG_AUDITSYSCALL
    plug-names_cache-memleak.patch
 
-   Security: Yes; Should request CVE
+   Security: CAN-2005-3181
    2.6.13: applied
    2.6.12: added to svn; backport; plug-names_cache-memleak.dpatch
    2.6.8-sarge: added to svn; backport; plug-names_cache-memleak.dpatch

Added: people/horms/patch_notes/cve/CAN-2005-3181
===================================================================
--- people/horms/patch_notes/cve/CAN-2005-3181	2005-10-28 09:00:24 UTC (rev 4678)
+++ people/horms/patch_notes/cve/CAN-2005-3181	2005-10-28 09:17:38 UTC (rev 4679)
@@ -0,0 +1,19 @@
+======================================================
+Candidate: CAN-2005-3181
+URL: http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=CAN-2005-3181
+Reference: 
+CONFIRM: http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=829841146878e082613a49581ae252c071057c23
+Description: 
+ Linux kernel before 2.6.13.4, when CONFIG_AUDITSYSCALL is enabled, uses an
+ incorrect function to free names_cache memory, which prevents the memory
+ from being tracked by AUDITSYSCALL code and leads to a memory leak that
+ allows attackers to cause a denial of service (memory consumption).
+
+Bug:
+fixed-upstream: pending (2.6.13); submitted for inclsuion in 2.4.32-rc2
+2.6.13: released (2.6.13+2.6.14-rc4-0experimental.1)
+2.6.8-sarge-security: pending (2.6.8-16sarge2)
+2.6.8-sarge: pending (2.6.8-17)
+2.4.27-sarge-security: pending (2.4.27-10sarge2)
+2.4.27-sarge/sid: pending (2.4.27-12)
+

Copied: people/horms/patch_notes/cve/plug-names_cache-memleak.dpatch (from rev 4669, people/horms/patch_notes/cve/setkeys-needs-root.patch)

Modified: people/horms/patch_notes/cve/setkeys-needs-root.patch
===================================================================
--- people/horms/patch_notes/cve/setkeys-needs-root.patch	2005-10-28 09:00:24 UTC (rev 4678)
+++ people/horms/patch_notes/cve/setkeys-needs-root.patch	2005-10-28 09:17:38 UTC (rev 4679)
@@ -1,18 +1,19 @@
 ======================================================
-Candidate: CVE-2005-3257
-URL: http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=CVE-2005-3257
-Reference: MISC:##URL## 
-CONFIRM: http://article.gmane.org/gmane.linux.debian.devel.bugs.general/8533
+Candidate: CAN-2005-3181
+URL: http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=CAN-2005-3181
+Reference: 
+CONFIRM: http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=829841146878e082613a49581ae252c071057c23
 Description: 
- The VT implementation (vt_ioctl.c) in Linux kernel 2.6.12 allows local
- users to use the KDSKBSENT ioctl on terminals of other users and gain
- privileges, as demonstrated by modifying key bindings using loadkeys. 
+ Linux kernel before 2.6.13.4, when CONFIG_AUDITSYSCALL is enabled, uses an
+ incorrect function to free names_cache memory, which prevents the memory
+ from being tracked by AUDITSYSCALL code and leads to a memory leak that
+ allows attackers to cause a denial of service (memory consumption).
 
-Bug: #334113
-fixed-upstream: Not upstream yet, but in -mm tree
-2.6.13: pending upstream
-2.6.12: pending upstream
-2.6.8-sarge-security: pending upstream
-2.6.8-sarge: pending upstream
-2.4.27-sarge-security: pending upstream
-2.4.27-sarge/sid: pending upstream
+Bug:
+fixed-upstream: pending (2.6.13); submitted for inclsuion in 2.4.32-rc2
+2.6.13: released (2.6.13+2.6.14-rc4-0experimental.1)
+2.6.8-sarge-security: pending (2.6.8-16sarge2)
+2.6.8-sarge: pending (2.6.8-17)
+2.4.27-sarge-security: pending (2.4.27-10sarge2)
+2.4.27-sarge/sid: pending (2.4.27-12)
+




More information about the Kernel-svn-changes mailing list