[kernel-sec-discuss] r686 - active

Martin Pitt mpitt at alioth.debian.org
Tue Jan 16 11:33:48 CET 2007


Author: mpitt
Date: 2007-01-16 11:33:48 +0100 (Tue, 16 Jan 2007)
New Revision: 686

Modified:
   active/CVE-2006-4814
Log:
CVE-2006-4814: flesh out

Modified: active/CVE-2006-4814
===================================================================
--- active/CVE-2006-4814	2007-01-16 10:23:50 UTC (rev 685)
+++ active/CVE-2006-4814	2007-01-16 10:33:48 UTC (rev 686)
@@ -1,8 +1,14 @@
 Candidate: CVE-2006-4814
 References: 
+ http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2f77d107050abc14bc393b34bdb7b91cf670c250
 Description: 
- mincore hang
+ The mincore function in the Linux kernel before 2.4.33.6 does not
+ properly lock access to user space, which has unspecified impact and
+ attack vectors, possibly related to a deadlock.
 Ubuntu-Description: 
+ Doug Chapman discovered an improper lock handling in the mincore()
+ function. A local attacker could exploit this to cause an eternal
+ hang in the kernel, rendering the machine unusable.
 Notes: 
 Bugs: 
 upstream: pending (2.6.20), released (2.4.34-rc3)
@@ -10,6 +16,6 @@
 2.6.18-etch: pending (2.6.18-9)
 2.6.8-sarge-security: pending (2.6.8-16sarge7) [mincore_hang.dpatch, mincore-fixes.dpatch]
 2.4.27-sarge-security: pending (2.4.27-10sarge6) [239_mincore-hang.diff]
-2.6.12-breezy-security: 
-2.6.15-dapper-security: 
-2.6.17-edgy-security: 
+2.6.12-breezy-security: needed
+2.6.15-dapper-security: needed
+2.6.17-edgy-security: needed




More information about the kernel-sec-discuss mailing list