[kernel-sec-discuss] r756 - active

Martin Pitt mpitt at alioth.debian.org
Fri Apr 27 10:27:58 UTC 2007


Author: mpitt
Date: 2007-04-27 10:27:58 +0000 (Fri, 27 Apr 2007)
New Revision: 756

Modified:
   active/CVE-2007-1000
Log:
CVE-2007-1000: ubuntu status

Modified: active/CVE-2007-1000
===================================================================
--- active/CVE-2007-1000	2007-04-26 21:15:52 UTC (rev 755)
+++ active/CVE-2007-1000	2007-04-27 10:27:58 UTC (rev 756)
@@ -4,6 +4,9 @@
  http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=286930797d74b2c9a5beae84836044f6a836235f
 Description: 
 Ubuntu-Description: 
+ Due to an variable handling flaw in the  ipv6_getsockopt_sticky()
+ function a local attacker could exploit the getsockopt() calls to
+ read arbitrary kernel memory. This could disclose sensitive data.
 Notes: 
  dannf> function doesn't exist in 2.6.8 - wtarreau says 2.4 isn't vulnerable
 Bugs: 
@@ -12,6 +15,6 @@
 2.6.18-etch-security: pending (2.6.18.dfsg.1-11etch1) [bugfix/ipv6_getsockopt_sticky-null-opt.patch]
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A
-2.6.12-breezy-security: 
-2.6.15-dapper-security: 
-2.6.17-edgy-security: 
+2.6.15-dapper-security: needed
+2.6.17-edgy-security: needed
+2.6.20-feisty-security: needed




More information about the kernel-sec-discuss mailing list