http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0039 Race condition in the do_add_counters function in netfilter for Linux kernel 2.6.16 allows local users with CAP_NET_ADMIN capabilities to read kernel memory by triggering the race condition in a way that produces a size value that is inconsistent with allocated memory, which leads to a buffer over-read in IPT_ENTRY_ITERATE. http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1857 Buffer overflow in SCTP in Linux kernel before 2.6.16.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a malformed HB-ACK chunk. http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1858 SCTP in Linux kernel before 2.6.16.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a chunk length that is inconsistent with the actual length of provided parameters. This are fixed in 2.4.33-rc2.
Created attachment 90545 [details, diff] CVE-2006-0039 split patch for 2.4.32
Created attachment 90546 [details, diff] CVE-2006-1857 split patch for 2.4.32
Created attachment 90547 [details, diff] CVE-2006-1858 split patch for 2.4.32
Patches split from the incremental 2.4.33-rc1 -> 2.4.33-rc2 patch from kernel.org sparc-sources-2.4.32-r6 will go in soon with the fixes, probably gentoo-sources & hardened-sources need to fix as well.
hardened-sources-2.4.32-r6 in portage with these 3 new patches plus one additional patch for sysctl controlable grsecurity resource logging I whiped up last night. Marked older h-s-r4 stable. Thank you Gustavo for pointing these patches out.
gentoo-sources-2.4.32-r6 now in the tree with the patches, thanks Gustavo. Maintainers: Please bump your sources to 2.4.33-rc2 or include security patches from the genpatches patchset. CCing: openmosix-sources: cluster, voxus rsbac-sources: kang xbox-sources: chrb, gimli
sparc-sources-2.4.32-r6 stable.
openmosix-sources, rsbac-sources, xbox-sources-2.4: Security masked.
Openmosix, RSBAC, Xbox 2.4 you are still vulnerable.
RSBAC and OpenMOSIX are still vulnerable, as far as I can tell. Kang, Tantive, please fix. Xbox-2.4 is hardmasked for security packages. I'll wait three days and then assign those to treecleaners, unless there are objections.
Assign what to treecleaners?
Also, not entirely sure why you added kernel@, none of the mentioned kernels are maintained by the kernel herd
Whoops, the kernel@ CC was an accident. I meant to add it to another bug. Assign xbox-sources-2.4.32-r1 to Treecleaners.
(In reply to comment #10) > RSBAC and OpenMOSIX are still vulnerable, as far as I can tell. Kang, Tantive, > please fix. Xbox-2.4 is hardmasked for security packages. I'll wait three days > and then assign those to treecleaners, unless there are objections. > not sure how old that is but since its re-opened with no reply: there is no 2.4 rsbac kernel, patches for rsbac are in sys-kernel/hardened (the 2.4 one only)
Looks fixed to me. Closing.
Duplicate: (CVE-2006-0039) http://bugs.gentoo.org/show_bug.cgi?id=133465