diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2008-01-29 18:19:54 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2008-01-29 18:19:54 +0000 |
commit | 54c4ed39e2f6dbef15543c7e42b8658ad7772350 (patch) | |
tree | e782ca1b15412ea37d196adf9eac7947ce48322e /retired/CVE-2007-2878 | |
parent | d1ca7897e27260f9c00439d16ec9aef0851d4de9 (diff) |
retire one issue
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1114 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2007-2878')
-rw-r--r-- | retired/CVE-2007-2878 | 29 |
1 files changed, 29 insertions, 0 deletions
diff --git a/retired/CVE-2007-2878 b/retired/CVE-2007-2878 new file mode 100644 index 00000000..12c27899 --- /dev/null +++ b/retired/CVE-2007-2878 @@ -0,0 +1,29 @@ +Candidate: CVE-2007-2878 +References: + http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.2 +Description: + The VFAT compat ioctls in the Linux kernel before 2.6.21.2, when run + on a 64-bit system, allow local users to corrupt a kernel_dirent struct + and cause a denial of service (system crash) via unknown vectors. +Ubuntu-Description: + Luca Tettamanti discovered a flaw in the VFAT compat ioctls on 64-bit + systems. A local attacker could corrupt a kernel_dirent struct and cause + a denial of service. +Notes: + dannf> reproduced in etch using reproducer provided in the changeset + dannf> backporting the fix only proved hazardous as there was some recent + dannf> restructuring - i've elected to backport that as well + dannf> (fat-move-ioctl-compat-code.patch) + dannf> marking sarge kernels as N/A because amd64 wasn't officially supported + dannf> and the backport is non-trivial (read: risk outweighs benefit) + dannf> + dannf> reverted from etch-security branch in r9295 due to ABI change +Bugs: +upstream: released (2.6.21.2) +linux-2.6: released (2.6.21-3) +2.6.18-etch-security: released (2.6.18.dfsg.1-17etch1) [bugfix/fat-move-ioctl-compat-code.patch, bugfix/fat-fix-compat-ioctls.patch] +2.6.8-sarge-security: N/A +2.4.27-sarge-security: N/A +2.6.15-dapper-security: released (2.6.15-28.57) +2.6.17-edgy-security: released (2.6.17.1-11.39) [6dbbec837f43196339b1638dc799d898fcba9302] +2.6.20-feisty-security: released (2.6.20-16.31) [5825ab378271ac6ead26504a46b0d404b63592dc] |