[kernel-sec-discuss] r1023 - active ignored

keescook-guest at alioth.debian.org keescook-guest at alioth.debian.org
Wed Nov 21 22:17:58 UTC 2007


Author: keescook-guest
Date: 2007-11-21 22:17:58 +0000 (Wed, 21 Nov 2007)
New Revision: 1023

Added:
   active/CVE-2006-6058
Removed:
   ignored/CVE-2006-6058
Log:
re-activating CVE-2006-6058 since there is a work-around upstream

Copied: active/CVE-2006-6058 (from rev 1022, ignored/CVE-2006-6058)
===================================================================
--- active/CVE-2006-6058	                        (rev 0)
+++ active/CVE-2006-6058	2007-11-21 22:17:58 UTC (rev 1023)
@@ -0,0 +1,29 @@
+Candidate: CVE-2006-6058
+References: 
+ http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.23.y.git;a=commitdiff;h=f0ae3188daf70ed07a4dfbeb133bef3a92838a15
+ MISC:http://projects.info-pull.com/mokb/MOKB-17-11-2006.html
+ FRSIRT:ADV-2006-4613
+ URL:http://www.frsirt.com/english/advisories/2006/4613
+ SECUNIA:23034
+ URL:http://secunia.com/advisories/23034 
+Description: 
+ The minix filesystem code in Linux kernel 2.6.x up to 2.6.18, and possibly
+ other versions, allows local users to cause a denial of service (hang) via a
+ malformed minix file stream that triggers an infinite loop in the minix_bmap
+ function. NOTE: this issue might be due to an integer overflow or signedness
+ error.
+Ubuntu-Description: 
+Notes: 
+ dannf> ignored for sarge for now - only applies under very rare circumstances
+        and don't know if there's an upstream fix
+ jmm> We can ignore this, it has no practical ramifications
+Bugs: 
+upstream: released (2.6.23.2)
+linux-2.6: ignored
+2.6.18-etch-security: ignored
+2.6.8-sarge-security: ignored
+2.4.27-sarge-security: ignored
+2.6.15-dapper-security: needed
+2.6.17-edgy-security: needed
+2.6.20-feisty-security: needed
+2.6.22-gutsy-security: needed

Deleted: ignored/CVE-2006-6058
===================================================================
--- ignored/CVE-2006-6058	2007-11-21 22:17:28 UTC (rev 1022)
+++ ignored/CVE-2006-6058	2007-11-21 22:17:58 UTC (rev 1023)
@@ -1,29 +0,0 @@
-Candidate: CVE-2006-6058
-References: 
- http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.23.y.git;a=commitdiff;h=f0ae3188daf70ed07a4dfbeb133bef3a92838a15
- MISC:http://projects.info-pull.com/mokb/MOKB-17-11-2006.html
- FRSIRT:ADV-2006-4613
- URL:http://www.frsirt.com/english/advisories/2006/4613
- SECUNIA:23034
- URL:http://secunia.com/advisories/23034 
-Description: 
- The minix filesystem code in Linux kernel 2.6.x up to 2.6.18, and possibly
- other versions, allows local users to cause a denial of service (hang) via a
- malformed minix file stream that triggers an infinite loop in the minix_bmap
- function. NOTE: this issue might be due to an integer overflow or signedness
- error.
-Ubuntu-Description: 
-Notes: 
- dannf> ignored for sarge for now - only applies under very rare circumstances
-        and don't know if there's an upstream fix
- jmm> We can ignore this, it has no practical ramifications
-Bugs: 
-upstream: released (2.6.23.2)
-linux-2.6: ignored
-2.6.18-etch-security: ignored
-2.6.8-sarge-security: ignored
-2.4.27-sarge-security: ignored
-2.6.15-dapper-security: needed
-2.6.17-edgy-security: needed
-2.6.20-feisty-security: needed
-2.6.22-gutsy-security: needed




More information about the kernel-sec-discuss mailing list