Hi,

> anonym wrote (02 Apr 2014 14:50:51 GMT) :
> > Looking at the Debian changelog for the Linux kernel it seems only
> > these changes have CVE:s:
> 
Thanks for the research.
 
> I've had a look (details below) and my conclusion is that... I'm
> unsure if it's worth taking the risk of introducing regressions in
> 1.0. Other opinions?
> 
> > * nfqueue: Orphan frags in nfqnl_zcopy() and handle errors
> >   (CVE-2014-2568)
> 
> Info leak triggered from the LAN.
> 
Do you know what kind of info can leak? "sensitive information from
kernel memory" could include cryptographic keys?

> > * net: fix for a race condition in the inet frag code
> > (CVE-2014-0100)
> 
> use-after-free => DoS and "possibly [...] unspecified other impact"
> Over ICMP, so generally exploitable only on the LAN.
> Requires high CPU load on the attacked system.
> This one seems worth fixing.
> 
[...]
> 
> > * skbuff: skb_segment: orphan frags before copying (CVE-2014-0131)
> 
> Info leak triggered from the LAN.
> 

I'd say it's worth taking the risk of regressions, at least if the two
info leak might include cryptographic information leak.

Cheers
_______________________________________________
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Reply via email to