[kernel] r5391 - patch-tracking
Moritz Muehlenhoff
jmm-guest at costa.debian.org
Tue Jan 10 21:22:52 UTC 2006
Author: jmm-guest
Date: Tue Jan 10 21:22:50 2006
New Revision: 5391
Added:
patch-tracking/CVE-2005-4618
Modified:
patch-tracking/CVE-2005-0109
patch-tracking/CVE-2006-0096
Log:
new issue: CVE-2005-4618
updates
Modified: patch-tracking/CVE-2005-0109
==============================================================================
--- patch-tracking/CVE-2005-0109 (original)
+++ patch-tracking/CVE-2005-0109 Tue Jan 10 21:22:50 2006
@@ -38,6 +38,10 @@
There's no upstream patch, but Ubuntu has included a patch that disables
HT by default, but allows users to turn it on again by booting w/ ht=on;
included here in the patch-tracker.
+ jmm> On linux-kernel nearly everyone disagreed that this a practical attack
+ jmm> Plus, I remember some fixes for OpenSSL, that would render the attack
+ jmm> impossible, so I think it might be wiser to fix this in OpenSSL?
+ jmm> What did other distributions like Red Hat, SuSE or OWL do?
Bugs:
upstream:
linux-2.6:
Added: patch-tracking/CVE-2005-4618
==============================================================================
--- (empty file)
+++ patch-tracking/CVE-2005-4618 Tue Jan 10 21:22:50 2006
@@ -0,0 +1,23 @@
+Candidate: CVE-2005-4618
+References:
+ http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15
+ http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8febdd85adaa41fa1fc1cb31286210fc2cd3ed0c
+Description:
+ Buffer overflow in sysctl in the Linux Kernel 2.6 before 2.6.15 allows
+ local users to cause a denial of service and possibly execute arbitrary
+ code via a long string, which causes sysctl to write a zero byte outside
+ the buffer.
+Notes:
+Bugs:
+upstream:
+linux-2.6:
+2.6.8-sarge-security:
+2.4.27-sarge-security:
+2.6.8:
+2.4.27:
+2.4.19-woody-security:
+2.4.18-woody-security:
+2.4.17-woody-security:
+2.4.16-woody-security:
+2.4.17-woody-security-hppa:
+2.4.17-woody-security-ia64:
Modified: patch-tracking/CVE-2006-0096
==============================================================================
--- patch-tracking/CVE-2006-0096 (original)
+++ patch-tracking/CVE-2006-0096 Tue Jan 10 21:22:50 2006
@@ -22,8 +22,8 @@
horms> not in the changelog for 2.4.27-8, so I don't think the first line
horms> of the statement above is correct
Bugs:
-upstream:
-linux-2.6: released (2.6.11), fixed (2.4.29)
+upstream: released (2.6.11), fixed (2.4.29)
+linux-2.6: N/A
2.6.8-sarge-security: pending (2.6.8-16sarge2) [net-sdla-coverty.dpatch]
2.4.27-sarge-security: released (2.4.27-8) [129_net_sdla_coverty.diff]
2.6.8: pending (2.6.8-17) [net-sdla-coverty.dpatch]
More information about the Kernel-svn-changes
mailing list