summaryrefslogtreecommitdiffstats
path: root/active/CVE-2007-2878
blob: e9cfb2e369b7ba568da97345633070fcd5a93f16 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
Candidate: CVE-2007-2878
References:
 http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.2
Description: 
 The VFAT compat ioctls in the Linux kernel before 2.6.21.2, when run
 on a 64-bit system, allow local users to corrupt a kernel_dirent struct
 and cause a denial of service (system crash) via unknown vectors.
Ubuntu-Description: 
Notes: 
 dannf> reproduced in etch using reproducer provided in the changeset
 dannf> backporting the fix only proved hazardous as there was some recent
 dannf> restructuring - i've elected to backport that as well
 dannf> (fat-move-ioctl-compat-code.patch)
 dannf> marking sarge kernels as N/A because amd64 wasn't officially supported
 dannf> and the backport is non-trivial (read: risk outweighs benefit)
Bugs: 
upstream: released (2.6.21.2)
linux-2.6: released (2.6.21-3)
2.6.18-etch-security: pending (2.6.18.dfsg1-13etch1) [bugfix/fat-fix-compat-ioctls.patch, bugfix/fat-move-ioctl-compat-code.patch]
2.6.8-sarge-security: N/A
2.4.27-sarge-security: N/A
2.6.15-dapper-security: pending (2.6.15-28.56)
2.6.17-edgy-security: pending (2.6.17.1-11.39) [6dbbec837f43196339b1638dc799d898fcba9302]
2.6.20-feisty-security: pending (2.6.20-16.29) [5825ab378271ac6ead26504a46b0d404b63592dc]

© 2014-2024 Faster IT GmbH | imprint | privacy policy