Bug#303294: marked as done (CAN-2005-0400: ext2 mkdir() leaks kernel data)
Your message dated Thu, 1 Feb 2007 12:45:07 -0700
with message-id <[🔎] 20070201194506.GA15879@colo>
and subject line Bug#303294: CAN-2005-0400: ext2 mkdir() leaks kernel data
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: CAN-2005-0400: ext2 mkdir() leaks kernel data
- From: Moritz Muehlenhoff <jmm@inutil.org>
- Date: Tue, 05 Apr 2005 23:12:22 +0200
- Message-id: <E1DIvLT-0002jE-99@localhost.localdomain>
Package: kernel-source-2.4.27
Severity: important
Tags: security
CAN-2005-0400 reports that an information leak occurs in the ext2 mkdir():
See http://linux.bkbits.net:8080/linux-2.4/cset@1.1481?nav=index.html|ChangeSet@-2w
for a description and a patch.
Cheers,
Moritz
-- System Information:
Debian Release: 3.1
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.11
Locale: LANG=C, LC_CTYPE=de_DE.ISO-8859-15@euro (charmap=ISO-8859-15)
--- End Message ---
--- Begin Message ---
Version: 2.4.27-10
On Thu, Feb 01, 2007 at 07:08:39PM +0100, Martin Michlmayr wrote:
> * Horms <horms@debian.org> [2005-04-06 13:04]:
> > > See http://linux.bkbits.net:8080/linux-2.4/cset@1.1481?nav=index.html|ChangeSet@-2w
> > > for a description and a patch.
> >
> > Thanks, this is in SVN.
>
> This was tagged as pending in 2004. Will there be another update of
> the 2.4.27 kernel soon or what is going to happen with those bugs?
> #323363 is tagged pending as well and #332228 seems to remain
> unresolved.
This was fixed in 3.1r0, just never closed the bug until now:
http://svn.debian.org/wsvn/kernel-sec/retired/CVE-2005-0400
Thanks for bringing it to my attention.
--
dann frazier
--- End Message ---
Reply to: