[kernel-sec-discuss] r833 - active

jmm at alioth.debian.org jmm at alioth.debian.org
Thu May 24 16:02:27 UTC 2007


Author: jmm
Date: 2007-05-24 16:02:27 +0000 (Thu, 24 May 2007)
New Revision: 833

Removed:
   active/CVE-2006-6058
Modified:
   active/CVE-2007-1861
Log:
ignore & retire, no security relevance for practical purposes


Deleted: active/CVE-2006-6058
===================================================================
--- active/CVE-2006-6058	2007-05-23 06:09:32 UTC (rev 832)
+++ active/CVE-2006-6058	2007-05-24 16:02:27 UTC (rev 833)
@@ -1,26 +0,0 @@
-Candidate: CVE-2006-6058
-References: 
- MISC:http://projects.info-pull.com/mokb/MOKB-17-11-2006.html
- FRSIRT:ADV-2006-4613
- URL:http://www.frsirt.com/english/advisories/2006/4613
- SECUNIA:23034
- URL:http://secunia.com/advisories/23034 
-Description: 
- The minix filesystem code in Linux kernel 2.6.x up to 2.6.18, and possibly
- other versions, allows local users to cause a denial of service (hang) via a
- malformed minix file stream that triggers an infinite loop in the minix_bmap
- function. NOTE: this issue might be due to an integer overflow or signedness
- error.
-Ubuntu-Description: 
-Notes: 
- dannf> ignored for sarge for now - only applies under very rare circumstances
-        and don't know if there's an upstream fix
- jmm> We can ignore this, it has no practical ramifications
-Bugs: 
-upstream: 
-linux-2.6: ignored
-2.6.18-etch-security: ignored
-2.6.8-sarge-security: ignored
-2.4.27-sarge-security: ignored
-2.6.15-dapper-security: needed
-2.6.17-edgy-security: needed

Modified: active/CVE-2007-1861
===================================================================
--- active/CVE-2007-1861	2007-05-23 06:09:32 UTC (rev 832)
+++ active/CVE-2007-1861	2007-05-24 16:02:27 UTC (rev 833)
@@ -8,7 +8,7 @@
  jmm> Introduced in 2.6.13
 Bugs: 
 upstream: released (2.6.20.8, 2.6.21)
-linux-2.6: 
+linux-2.6: released (2.6.21-1)
 2.6.18-etch-security: released (2.6.18.dfsg.1-12etch2) [bugfix/netlink-infinite-recursion.patch]
 2.6.8-sarge-security: N/A
 2.4.27-sarge-security: N/A




More information about the kernel-sec-discuss mailing list