[kernel-sec-discuss] r563 - active
Martin Pitt
mpitt at costa.debian.org
Fri Aug 25 13:16:18 UTC 2006
Author: mpitt
Date: 2006-08-25 13:16:16 +0000 (Fri, 25 Aug 2006)
New Revision: 563
Modified:
active/CVE-2006-4093
Log:
flesh out CVE-2006-4093
Modified: active/CVE-2006-4093
===================================================================
--- active/CVE-2006-4093 2006-08-25 13:04:36 UTC (rev 562)
+++ active/CVE-2006-4093 2006-08-25 13:16:16 UTC (rev 563)
@@ -1,15 +1,20 @@
-Candidate:
+Candidate: CVE-2006-4093
References:
+ http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=9a936a2e0526089194159eae31238e36b1c19e74
Description: PPC HID0 DoS
Ubuntu-Description:
+ Olof Johansson discovered that the kernel did not disable the 'HID0'
+ bit on PowerPC 970 processors so that the ATTN instruction was
+ enabled. A local user could exploit this to crash the kernel. This
+ flaw only affects the powerpc architecture.
Notes:
Bugs:
upstream: released (2.4.33.1), released (2.6.17.9)
linux-2.6.16: needed
linux-2.6: needed
-2.6.8-sarge-security:
+2.6.8-sarge-security: needed
2.4.27-sarge-security: needed
-2.6.10-hoary-security:
-2.6.12-breezy-security:
-2.6.15-dapper-security:
-2.6.17-edgy:
+2.6.10-hoary-security: needed
+2.6.12-breezy-security: needed
+2.6.15-dapper-security: needed
+2.6.17-edgy: needed
More information about the kernel-sec-discuss
mailing list