[kernel-sec-discuss] r987 - active retired

jmm at alioth.debian.org jmm at alioth.debian.org
Wed Oct 3 16:34:16 UTC 2007


Author: jmm
Date: 2007-10-03 16:34:16 +0000 (Wed, 03 Oct 2007)
New Revision: 987

Added:
   retired/CVE-2006-6057
Removed:
   active/CVE-2006-6057
Log:
retire GFS issue


Deleted: active/CVE-2006-6057
===================================================================
--- active/CVE-2006-6057	2007-10-03 16:33:59 UTC (rev 986)
+++ active/CVE-2006-6057	2007-10-03 16:34:16 UTC (rev 987)
@@ -1,33 +0,0 @@
-Candidate: CVE-2006-6057
-References: 
- http://projects.info-pull.com/mokb/MOKB-15-11-2006.html
-Description:
- The Linux kernel 2.6.x up to 2.6.18, and possibly other versions, on
- Fedora Core 6 and possibly other operating systems, allows local
- users to cause a denial of service (crash) via a malformed gfs2 file
- stream that triggers a NULL pointer dereference in the init_journal
- function.
-Ubuntu-Description: 
-Notes: 
- <fabbione> yes we do but it's not usable
- <pitti> that means you cannot create a gfs2 fs?
- <fabbione> it's marked as experimental
- <fabbione> you can
- <fabbione> but there is no way it will last working for more than 10 seconds on load
- <fabbione> it's totally buggy at design level
- <fabbione> even what's in linus tree is broken
- <pitti> ok, so we can treat this with low priority
-
- gfs2 should just be disabled in edgy-security.
-
- <dannf> etch's 2.6.18 didn't include gfs
- jmm> 6c93fd1e578669364e026a0d44c669b871e2a8c4
-Bugs: 
-upstream: released (2.6.20)
-linux-2.6: released (2.6.20-1)
-2.6.18-etch-security: N/A
-2.6.8-sarge-security: N/A
-2.4.27-sarge-security: N/A
-2.6.12-breezy-security: N/A
-2.6.15-dapper-security: N/A
-2.6.17-edgy-security: released (2.6.17.1-11.35)

Copied: retired/CVE-2006-6057 (from rev 986, active/CVE-2006-6057)
===================================================================
--- retired/CVE-2006-6057	                        (rev 0)
+++ retired/CVE-2006-6057	2007-10-03 16:34:16 UTC (rev 987)
@@ -0,0 +1,33 @@
+Candidate: CVE-2006-6057
+References: 
+ http://projects.info-pull.com/mokb/MOKB-15-11-2006.html
+Description:
+ The Linux kernel 2.6.x up to 2.6.18, and possibly other versions, on
+ Fedora Core 6 and possibly other operating systems, allows local
+ users to cause a denial of service (crash) via a malformed gfs2 file
+ stream that triggers a NULL pointer dereference in the init_journal
+ function.
+Ubuntu-Description: 
+Notes: 
+ <fabbione> yes we do but it's not usable
+ <pitti> that means you cannot create a gfs2 fs?
+ <fabbione> it's marked as experimental
+ <fabbione> you can
+ <fabbione> but there is no way it will last working for more than 10 seconds on load
+ <fabbione> it's totally buggy at design level
+ <fabbione> even what's in linus tree is broken
+ <pitti> ok, so we can treat this with low priority
+
+ gfs2 should just be disabled in edgy-security.
+
+ <dannf> etch's 2.6.18 didn't include gfs
+ jmm> 6c93fd1e578669364e026a0d44c669b871e2a8c4
+Bugs: 
+upstream: released (2.6.20)
+linux-2.6: released (2.6.20-1)
+2.6.18-etch-security: N/A
+2.6.8-sarge-security: N/A
+2.4.27-sarge-security: N/A
+2.6.12-breezy-security: N/A
+2.6.15-dapper-security: N/A
+2.6.17-edgy-security: released (2.6.17.1-11.35)




More information about the kernel-sec-discuss mailing list