diff options
author | Martin Pitt <mpitt@debian.org> | 2007-04-27 10:27:58 +0000 |
---|---|---|
committer | Martin Pitt <mpitt@debian.org> | 2007-04-27 10:27:58 +0000 |
commit | b5136553adaddd6e1eb63d463aad0e7a7680080e (patch) | |
tree | 336f736e74bc837df80c3829490c9f6471e995f0 /active | |
parent | 9b9fcc0616cf949e7c88a7d93d2c60ec4ec69da6 (diff) |
CVE-2007-1000: ubuntu status
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@756 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'active')
-rw-r--r-- | active/CVE-2007-1000 | 9 |
1 files changed, 6 insertions, 3 deletions
diff --git a/active/CVE-2007-1000 b/active/CVE-2007-1000 index 4f7612ec..6703ee46 100644 --- a/active/CVE-2007-1000 +++ b/active/CVE-2007-1000 @@ -4,6 +4,9 @@ References: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=286930797d74b2c9a5beae84836044f6a836235f Description: Ubuntu-Description: + Due to an variable handling flaw in the ipv6_getsockopt_sticky() + function a local attacker could exploit the getsockopt() calls to + read arbitrary kernel memory. This could disclose sensitive data. Notes: dannf> function doesn't exist in 2.6.8 - wtarreau says 2.4 isn't vulnerable Bugs: @@ -12,6 +15,6 @@ linux-2.6: 2.6.18-etch-security: pending (2.6.18.dfsg.1-11etch1) [bugfix/ipv6_getsockopt_sticky-null-opt.patch] 2.6.8-sarge-security: N/A 2.4.27-sarge-security: N/A -2.6.12-breezy-security: -2.6.15-dapper-security: -2.6.17-edgy-security: +2.6.15-dapper-security: needed +2.6.17-edgy-security: needed +2.6.20-feisty-security: needed |