[kernel-sec-discuss] r815 - active retired

Moritz Muehlenhoff jmm at alioth.debian.org
Mon May 7 17:32:52 UTC 2007


Author: jmm
Date: 2007-05-07 17:32:50 +0000 (Mon, 07 May 2007)
New Revision: 815

Added:
   retired/CVE-2007-0006
Removed:
   active/CVE-2007-0006
Log:
retire CVE-2007-0006


Deleted: active/CVE-2007-0006
===================================================================
--- active/CVE-2007-0006	2007-05-07 17:32:21 UTC (rev 814)
+++ active/CVE-2007-0006	2007-05-07 17:32:50 UTC (rev 815)
@@ -1,19 +0,0 @@
-Candidate: CVE-2007-0006
-References: 
- http://bugzilla.kernel.org/show_bug.cgi?id=7727
- http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=9ad0830f307bcd8dc285cfae58998d43b21727f4
-Description: 
- The key serial number collision avoidance code in the key_alloc_serial
- function in Linux kernel 2.6.9 up to 2.6.20 allows local users to cause a
- denial of service (crash) via vectors that trigger a null dereference, as
- originally reported as "spinlock CPU recursion."
-Ubuntu-Description: 
-Notes: 
-Bugs: 398470
-upstream: released (2.6.21, 2.6.20.2)
-linux-2.6: released (2.6.20-1)
-2.6.18-etch-security: released (2.6.18.dfsg.1-12) [bugfix/keys-serial-num-collision.patch]
-2.6.8-sarge-security: N/A
-2.4.27-sarge-security: N/A
-2.6.15-dapper-security: released (2.6.15-28.53)
-2.6.17-edgy-security: released (2.6.17.1-11.37)

Copied: retired/CVE-2007-0006 (from rev 814, active/CVE-2007-0006)




More information about the kernel-sec-discuss mailing list