[kernel-sec-discuss] r563 - active

Martin Pitt mpitt at costa.debian.org
Fri Aug 25 13:16:18 UTC 2006


Author: mpitt
Date: 2006-08-25 13:16:16 +0000 (Fri, 25 Aug 2006)
New Revision: 563

Modified:
   active/CVE-2006-4093
Log:
flesh out CVE-2006-4093

Modified: active/CVE-2006-4093
===================================================================
--- active/CVE-2006-4093	2006-08-25 13:04:36 UTC (rev 562)
+++ active/CVE-2006-4093	2006-08-25 13:16:16 UTC (rev 563)
@@ -1,15 +1,20 @@
-Candidate: 
+Candidate: CVE-2006-4093
 References: 
+ http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=9a936a2e0526089194159eae31238e36b1c19e74
 Description: PPC HID0 DoS 
 Ubuntu-Description:
+ Olof Johansson discovered that the kernel did not disable the 'HID0'
+ bit on PowerPC 970 processors so that the ATTN instruction was
+ enabled. A local user could exploit this to crash the kernel. This
+ flaw only affects the powerpc architecture.
 Notes: 
 Bugs: 
 upstream: released (2.4.33.1), released (2.6.17.9)
 linux-2.6.16: needed
 linux-2.6: needed
-2.6.8-sarge-security: 
+2.6.8-sarge-security: needed
 2.4.27-sarge-security: needed
-2.6.10-hoary-security:
-2.6.12-breezy-security:
-2.6.15-dapper-security:
-2.6.17-edgy:
+2.6.10-hoary-security: needed
+2.6.12-breezy-security: needed
+2.6.15-dapper-security: needed
+2.6.17-edgy: needed




More information about the kernel-sec-discuss mailing list