[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

2.6.13.4



On Sun, Oct 09, 2005 at 12:18:54PM +0200, Moritz Muehlenhoff wrote:
> Hi Horms / security team,
> I found three more security related reports/patches on linux-kernel.

Below are my annotations of 2.6.13.4 for all sarge and beyond kernels.

I'm particularly interested in someone checking my backports
of the sparc64 problem (not security).

The attached document currently resides in:
http://svn.debian.org/wsvn/kernel/people/horms/patch_notes/2.6-stable/2.6.13.4?op=file&rev=0&sc=0

-- 
Horms


Version: 2.6.13.4
URL: http://www.kernel.org/git/?p=linux/kernel/git/chrisw/stable-queue.git;a=tree;f=2.6.13.4

 * ieee1394/sbp2: fixes for hot-unplug and module unloading
   ieee1394-sbp2-fixes-for-hot-unplug-and-module-unloading.patch

   Security: No
   2.6.13: applied
   2.6.12: added to svn; ieee1394-sbp2-fixes-for-hot-unplug-and-module-unloading.patch
   2.6.8-sarge: added to svn; ieee1394-sbp2-fixes-for-hot-unplug-and-module-unloading.dpatch
   2.6.8-sarge-security: not a security fix
   2.4.27-sid/sarge: not vulnerable 
   2.4.27-sarge-security:  not vulnerable; not a security fix

 * [SECURITY] orinoco: Information leakage due to incorrect padding
   orinoco-info-leak.patch

   Security: Yes; Should request CVE
   2.6.13: applied
   2.6.12: added to svn; orinoco-info-leak.patch
   2.6.8-sarge: added to svn; backported; orinoco-info-leak.dpatch
   2.6.8-sarge-security: added to svn; backported; orinoco-info-leak.dpatch
   2.4.27-sid/sarge: added to svn; backported; 192_orinoco-info-leak.diff
   2.4.27-sarge-security: added to svn; backported; 192_orinoco-info-leak.diff

 * [TCP]: BIC coding bug in Linux 2.6.13
   tcp-congestion-control-bug.patch

   Security: pending examination: 
   2.6.13: applied
   2.6.12: not vulnerable
   2.6.8-sarge: not vulnerable
   2.6.8-sarge-security: not vulnerable; not a security fix
   2.4.27-sid/sarge: not vulnerable
   2.4.27-sarge-security: not vulnerable; not a security fix

 * [SECURITY] Fix drm 'debug' sysfs permissions
   drm-module_param-permissions-fix.patch

   Security: Yes; Should request CVE
   2.6.13: applied
   2.6.12: added to svn; drm-module_param-permissions-fix.patch
   2.6.8-sarge: not vulnerable
   2.6.8-sarge-security: not vulnerable
   2.4.27-sid/sarge: not vulnerable
   2.4.27-sarge-security: not vulnerable

 * [SPARC64]: Fix userland FPU state corruption.
   fix-sparc64-fpu-register-corruption.patch

   Security: No
   2.6.13: applied
   2.6.12: added to svn; backport; fix-sparc64-fpu-register-corruption.patch
   2.6.8-sarge: added to svn; backport; fix-sparc64-fpu-register-corruption.dpatch
   2.6.8-sarge-security: not a security fix
   2.4.27-sid/sarge: not vulnerable
   2.4.27-sarge-security: not vulnerable

   N.B: Could someone please look at these backports.
        They were trivial enough, but I have no way of testing them,
	nor do I have a good grasp of sparc assembly.
	I know this bug was painful to find, so presumably
	a miss-fix would be simmilarly painful. -- Horms

 * Avoid 'names_cache' memory leak with CONFIG_AUDITSYSCALL
   plug-names_cache-memleak.patch

   Security: No
   2.6.13: applied
   2.6.12: added to svn; backport; plug-names_cache-memleak.dpatch
   2.6.8-sarge: added to svn; backport; plug-names_cache-memleak.dpatch
   2.6.8-sarge-security: not a security fix
   2.4.27-sid/sarge: added to svn; backport; 193_plug-names_cache-memleak.diff
   2.4.27-sarge-security: pending examination

 * [SECURITY] key: plug request_key_auth memleak
   See CAN-2005-3119
   key-rka-memleak.patch

   Security: Yes; CAN-2005-3119
   2.6.13: applied
   2.6.12: not vulnerable
   2.6.8-sarge: not vulnerable
   2.6.8-sarge-security: not vulnerable
   2.4.27-sid/sarge: not vulnerable
   2.4.27-sarge-security: not vulnerable


Reply to: