[Secure-testing-commits] r1101 - sarge-checks/CAN

Moritz Muehlenhoff jmm-guest@costa.debian.org
Thu, 19 May 2005 13:01:46 +0000


Author: jmm-guest
Date: 2005-05-19 13:01:43 +0000 (Thu, 19 May 2005)
New Revision: 1101

Modified:
   sarge-checks/CAN/list
Log:
Incorporate all info from the fixed 2.6.8-16 kernel upload.
We'll have to check back for the 15sarge kernels.


Modified: sarge-checks/CAN/list
===================================================================
--- sarge-checks/CAN/list	2005-05-19 12:51:25 UTC (rev 1100)
+++ sarge-checks/CAN/list	2005-05-19 13:01:43 UTC (rev 1101)
@@ -1388,7 +1388,7 @@
 	NOTE: not-for-us (HP OpenView)
 CAN-2005-1369 (The (1) it87 and (2) via686a drivers in I2C for Linux 2.6.x before ...)
 	NOTE: does not affect 2.4.27 per horms
-	- kernel-source-2.6.8 (unfixed; fix in svn; bug #307552)
+	- kernel-source-2.6.8 2.6.8-16
 	- kernel-source-2.6.11 (unfixed; fix in svn; bug #307552)
 CAN-2005-1368 (The key_user_lookup function in security/keys/key.c in Linux kernel ...)
 	NOTE: does not affect 2.6.8, 2.4.27 per horms
@@ -1617,6 +1617,7 @@
 	NOTE: reserved
 CAN-2005-1264 [Local privilege escalation in the Linux kernel's raw ioctl]
 	- kernel-source-2.6.8 2.6.8-15sarge1
+	- kernel-source-2.6.8 2.6.8-16
 	- kernel-source-2.6.11 2.6.11-5
 CAN-2005-1263 [Linux kernel ELF core dump privilege escalation]
 	- kernel-source-2.6.11 2.6.11 2.6.11-4
@@ -2242,7 +2243,7 @@
 	- php4 4.3.10-10
 CAN-2005-1041 (The fib_seq_start function in fib_hash.c in Linux kernel allows local ...)
 	- kernel-source-2.6.11 2.6.11-1
-	- kernel-source-2.6.8 (unfixed; fix in svn; bug #304548)
+	- kernel-source-2.6.8 2.6.8-16
 	NOTE: does not affect 2.4.27 per horms
 CAN-2005-1040 (Multiple unknown vulnerabilities in netapplet in Novell Linux Desktop ...)
 	TODO: check whether Debian's netapplet is vulnerable or whether this is SuSE
@@ -2525,7 +2526,7 @@
 CAN-2005-0917 (PHP remote code injection vulnerability in index_header.php for ...)
 	NOTE: not-for-us (EncapsBB not in Debian)
 CAN-2005-0916 (AIO in the Linux kernel 2.6.11 on the PPC64 or IA64 architectures with ...)
-	- kernel-source-2.6.8-16
+	- kernel-source-2.6.8 2.6.8-16
 	NOTE: 2.4 doesn't seem to be vulnerable
 CAN-2005-0915 (Webmasters-Debutants WD Guestbook 2.8 allows remote attackers to ...)
 	NOTE: not-for-us (Webmasters-Debutants WD Guestbook)
@@ -2883,7 +2884,7 @@
 	NOTE: not-for-us (Solaris)
 CAN-2005-0815 (Multiple "range checking flaws" in the ISO9660 filesystem handler in ...)
 	- kernel-source-2.6.8 2.6.8-16
-	- kernel-source-2.4.27-10
+	- kernel-source-2.4.27 2.4.27-10
 CAN-2005-0814 (Unknown vulnerability in lshd in Lysator LSH 1.x and 2.x before 2.0.1 ...)
 	{DSA-717-1}
 	- lsh-utils 2.0.1-1
@@ -3018,7 +3019,7 @@
 	- kernel-source-2.6.8 2.6.8-16
 CAN-2005-0749 [Linux kernel DoS vulnerability in elf_load_library()]
 	- kernel-source-2.6.8 2.6.8-16
-	- kernel-source-2.4.27-10
+	- kernel-source-2.4.27 2.4.27-10
 CAN-2003-1131 (PHP remote code injection vulnerability in index.php in ...)
 	NOTE: not-for-us (ActiveCampaign KnowledgeBuilder)
 CAN-2002-1601 (The Connectables feature in Adobe PhotoDeluxe 3.1 prepends the Adobe ...)
@@ -6164,14 +6165,9 @@
 CAN-2004-1192 (Format string vulnerability in the lprintf function in Citadel/UX 6.27 ...)
 	NOTE: not-for-us (Citadel/UX)
 CAN-2004-1191 (Race condition in SuSE Linux 8.1 through 9.2, when run on SMP systems ...)
-	NOTE: joshk says he doesn't understand this one
-	NOTE: 2.4.27 is ok, 2.6.8 is vulnerable, 2.6.10 is ok
-	NOTE: http://xforce.iss.net/xforce/xfdb/18137
-	NOTE: 2.6.8 needs this patch: http://linux.bkbits.net:8080/linux-2.6/patch@1.1938.197.15?nav=cset@1.1938.197.15
-	NOTE: was bug #300163
-	NOTE: turns out that kernel-source-2.6.8 2.6.8-14 was incompletly fixed
-	kernel-source-2.6.8 2.6.8-16
-	kernel-source-2.4.27 2.4.27-6
+	NOTE: turned out that kernel-source-2.6.8 2.6.8-14 was incompletly fixed
+	- kernel-source-2.6.8 2.6.8-16
+	- kernel-source-2.4.27 2.4.27-6
 CAN-2004-1190 (SUSE Linux before 9.1 and SUSE Linux Enterprise Server before 9 do not ...)
 	NOTE: Response from Suse people reveals that http://linux.bkbits.net:8080/linux-2.6/hist/drivers/block/scsi_ioctl.c
 	NOTE: has a misleading entry titled "Fix exploitable hole"
@@ -7126,8 +7122,8 @@
 	NOTE: All 2.4 and 2.6 kernels verify the TCP sequence numbering when errors occur
 	NOTE: Kernel will never abort due to an ICMP packet
 CAN-2004-0790 (Multiple TCP/IP and ICMP implementations allow remote attackers to ...)
-	- kernel-source-2.6.8-16
-	- kernel-source-2.4.27-10
+	- kernel-source-2.6.8 2.6.8-16
+	- kernel-source-2.4.27 2.4.27-10
 CAN-2004-0789
 	NOTE: reserved
 CAN-2004-0788 (Integer overflow in the ICO image decoder for (1) gdk-pixbuf before ...)