[kernel-sec-discuss] r992 - active retired

jmm at alioth.debian.org jmm at alioth.debian.org
Fri Oct 5 06:49:35 UTC 2007


Author: jmm
Date: 2007-10-05 06:49:35 +0000 (Fri, 05 Oct 2007)
New Revision: 992

Added:
   retired/CVE-2007-2875
Removed:
   active/CVE-2007-2875
Modified:
   active/CVE-2007-2480
Log:
retire issue


Modified: active/CVE-2007-2480
===================================================================
--- active/CVE-2007-2480	2007-10-05 06:43:18 UTC (rev 991)
+++ active/CVE-2007-2480	2007-10-05 06:49:35 UTC (rev 992)
@@ -12,7 +12,7 @@
  jmm> reorg after 2.6.18
 Bugs: 
 upstream: released (2.6.22)
-linux-2.6: 
+linux-2.6: released (2.6.22-1)
 2.6.18-etch-security: ignored (2.6.18.dfsg.1-13etch1) "needs backport"
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 

Deleted: active/CVE-2007-2875
===================================================================
--- active/CVE-2007-2875	2007-10-05 06:43:18 UTC (rev 991)
+++ active/CVE-2007-2875	2007-10-05 06:49:35 UTC (rev 992)
@@ -1,25 +0,0 @@
-Candidate: CVE-2007-2875
-References: 
- http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.20.y.git;a=commit;h=85badbdf5120d246ce2bb3f1a7689a805f9c9006
- http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4
-Description: 
- Integer underflow in the cpuset_tasks_read function in the Linux kernel
- before 2.6.20.13, and 2.6.21.x before 2.6.21.4, when the cpuset filesystem
- is mounted, allows local users to obtain kernel memory contents by using a
- large offset when reading the /dev/cpuset/tasks file.
-Ubuntu-Description: 
- An integer underflow was discovered in the cpuset filesystem.  If mounted,
- local attackers could obtain kernel memory using large file offsets while
- reading the tasks file. This could disclose sensitive data.
-Notes: 
- Use simple_read_from_buffer to avoid possible underflow in
- cpuset_tasks_read which could allow user to read kernel memory.
-Bugs: 
-upstream: released (2.6.21.4)
-linux-2.6: released (2.6.21-5)
-2.6.18-etch-security: released (2.6.18.dfsg.1-13etch2) [bugfix/cpuset_tasks-underflow.patch]
-2.6.8-sarge-security: N/A
-2.4.27-sarge-security: N/A
-2.6.15-dapper-security: released (2.6.15-28.57)
-2.6.17-edgy-security: released (2.6.17.1-11.39) [1448fa0c7be21a3c6c31b20d19a8ecfafdfea143]
-2.6.20-feisty-security: released (2.6.20-16.31) [b07fd0532409fb2332562abc2254376222d1e913]

Copied: retired/CVE-2007-2875 (from rev 990, active/CVE-2007-2875)
===================================================================
--- retired/CVE-2007-2875	                        (rev 0)
+++ retired/CVE-2007-2875	2007-10-05 06:49:35 UTC (rev 992)
@@ -0,0 +1,25 @@
+Candidate: CVE-2007-2875
+References: 
+ http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.20.y.git;a=commit;h=85badbdf5120d246ce2bb3f1a7689a805f9c9006
+ http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4
+Description: 
+ Integer underflow in the cpuset_tasks_read function in the Linux kernel
+ before 2.6.20.13, and 2.6.21.x before 2.6.21.4, when the cpuset filesystem
+ is mounted, allows local users to obtain kernel memory contents by using a
+ large offset when reading the /dev/cpuset/tasks file.
+Ubuntu-Description: 
+ An integer underflow was discovered in the cpuset filesystem.  If mounted,
+ local attackers could obtain kernel memory using large file offsets while
+ reading the tasks file. This could disclose sensitive data.
+Notes: 
+ Use simple_read_from_buffer to avoid possible underflow in
+ cpuset_tasks_read which could allow user to read kernel memory.
+Bugs: 
+upstream: released (2.6.21.4)
+linux-2.6: released (2.6.21-5)
+2.6.18-etch-security: released (2.6.18.dfsg.1-13etch2) [bugfix/cpuset_tasks-underflow.patch]
+2.6.8-sarge-security: N/A
+2.4.27-sarge-security: N/A
+2.6.15-dapper-security: released (2.6.15-28.57)
+2.6.17-edgy-security: released (2.6.17.1-11.39) [1448fa0c7be21a3c6c31b20d19a8ecfafdfea143]
+2.6.20-feisty-security: released (2.6.20-16.31) [b07fd0532409fb2332562abc2254376222d1e913]




More information about the kernel-sec-discuss mailing list