[kernel] r5391 - patch-tracking

Moritz Muehlenhoff jmm-guest at costa.debian.org
Tue Jan 10 21:22:52 UTC 2006


Author: jmm-guest
Date: Tue Jan 10 21:22:50 2006
New Revision: 5391

Added:
   patch-tracking/CVE-2005-4618
Modified:
   patch-tracking/CVE-2005-0109
   patch-tracking/CVE-2006-0096
Log:
new issue: CVE-2005-4618
updates


Modified: patch-tracking/CVE-2005-0109
==============================================================================
--- patch-tracking/CVE-2005-0109	(original)
+++ patch-tracking/CVE-2005-0109	Tue Jan 10 21:22:50 2006
@@ -38,6 +38,10 @@
  There's no upstream patch, but Ubuntu has included a patch that disables
  HT by default, but allows users to turn it on again by booting w/ ht=on;
  included here in the patch-tracker.
+ jmm> On linux-kernel nearly everyone disagreed that this a practical attack
+ jmm> Plus, I remember some fixes for OpenSSL, that would render the attack
+ jmm> impossible, so I think it might be wiser to fix this in OpenSSL?
+ jmm> What did other distributions like Red Hat, SuSE or OWL do?
 Bugs: 
 upstream: 
 linux-2.6:

Added: patch-tracking/CVE-2005-4618
==============================================================================
--- (empty file)
+++ patch-tracking/CVE-2005-4618	Tue Jan 10 21:22:50 2006
@@ -0,0 +1,23 @@
+Candidate: CVE-2005-4618
+References:
+ http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15
+ http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8febdd85adaa41fa1fc1cb31286210fc2cd3ed0c 
+Description: 
+ Buffer overflow in sysctl in the Linux Kernel 2.6 before 2.6.15 allows
+ local users to cause a denial of service and possibly execute arbitrary
+ code via a long string, which causes sysctl to write a zero byte outside
+ the buffer.
+Notes: 
+Bugs: 
+upstream: 
+linux-2.6:
+2.6.8-sarge-security: 
+2.4.27-sarge-security: 
+2.6.8: 
+2.4.27:
+2.4.19-woody-security: 
+2.4.18-woody-security: 
+2.4.17-woody-security: 
+2.4.16-woody-security: 
+2.4.17-woody-security-hppa: 
+2.4.17-woody-security-ia64: 

Modified: patch-tracking/CVE-2006-0096
==============================================================================
--- patch-tracking/CVE-2006-0096	(original)
+++ patch-tracking/CVE-2006-0096	Tue Jan 10 21:22:50 2006
@@ -22,8 +22,8 @@
  horms> not in the changelog for 2.4.27-8, so I don't think the first line
  horms> of the statement above is correct
 Bugs: 
-upstream: 
-linux-2.6: released (2.6.11), fixed (2.4.29)
+upstream: released (2.6.11), fixed (2.4.29)
+linux-2.6: N/A
 2.6.8-sarge-security: pending (2.6.8-16sarge2) [net-sdla-coverty.dpatch]
 2.4.27-sarge-security: released (2.4.27-8) [129_net_sdla_coverty.diff]
 2.6.8: pending (2.6.8-17) [net-sdla-coverty.dpatch]



More information about the Kernel-svn-changes mailing list