[kernel-sec-discuss] r1109 - active retired
dannf at alioth.debian.org
dannf at alioth.debian.org
Tue Jan 22 16:14:23 UTC 2008
Author: dannf
Date: 2008-01-22 16:14:23 +0000 (Tue, 22 Jan 2008)
New Revision: 1109
Added:
retired/CVE-2006-6128
Removed:
active/CVE-2006-6128
Log:
retire CVE-2006-6128
Deleted: active/CVE-2006-6128
===================================================================
--- active/CVE-2006-6128 2008-01-22 16:14:06 UTC (rev 1108)
+++ active/CVE-2006-6128 2008-01-22 16:14:23 UTC (rev 1109)
@@ -1,30 +0,0 @@
-Candidate: CVE-2006-6128
-References:
- MISC:http://projects.info-pull.com/mokb/MOKB-25-11-2006.html
- FRSIRT:ADV-2006-4716
- URL:http://www.frsirt.com/english/advisories/2006/4716
- SECUNIA:23093
- URL:http://secunia.com/advisories/23093
- XF:linux-reiserfs-dos(30551)
- URL:http://xforce.iss.net/xforce/xfdb/30551
-Description:
- The ReiserFS functionality in Linux kernel 2.6.18, and possibly other
- versions, allows local users to cause a denial of service via a malformed
- ReiserFS file system that triggers memory corruption when a sync is performed.
-Ubuntu-Description:
-Notes:
- dannf> low impact; no known upstream fix
- jmm> ignored, only exploitable with manipulated fs images, for which mount
- jmm> privs are needed
- dannf> https://bugzilla.redhat.com/show_bug.cgi?id=250625 suggests this
- maybe fedora-specific. Indeed, I cannot reproduce w/ the MOKB fs
- any of the Debian kernels
-Bugs:
-upstream: N/A
-linux-2.6: N/A
-2.6.18-etch-security: N/A
-2.6.8-sarge-security: N/A
-2.4.27-sarge-security: N/A
-2.6.15-dapper-security: ignored
-2.6.17-edgy-security: ignored - no upstream fix.
-2.6.20-feisty-security: ignored - no upstream fix.
Copied: retired/CVE-2006-6128 (from rev 1108, active/CVE-2006-6128)
===================================================================
--- retired/CVE-2006-6128 (rev 0)
+++ retired/CVE-2006-6128 2008-01-22 16:14:23 UTC (rev 1109)
@@ -0,0 +1,30 @@
+Candidate: CVE-2006-6128
+References:
+ MISC:http://projects.info-pull.com/mokb/MOKB-25-11-2006.html
+ FRSIRT:ADV-2006-4716
+ URL:http://www.frsirt.com/english/advisories/2006/4716
+ SECUNIA:23093
+ URL:http://secunia.com/advisories/23093
+ XF:linux-reiserfs-dos(30551)
+ URL:http://xforce.iss.net/xforce/xfdb/30551
+Description:
+ The ReiserFS functionality in Linux kernel 2.6.18, and possibly other
+ versions, allows local users to cause a denial of service via a malformed
+ ReiserFS file system that triggers memory corruption when a sync is performed.
+Ubuntu-Description:
+Notes:
+ dannf> low impact; no known upstream fix
+ jmm> ignored, only exploitable with manipulated fs images, for which mount
+ jmm> privs are needed
+ dannf> https://bugzilla.redhat.com/show_bug.cgi?id=250625 suggests this
+ maybe fedora-specific. Indeed, I cannot reproduce w/ the MOKB fs
+ any of the Debian kernels
+Bugs:
+upstream: N/A
+linux-2.6: N/A
+2.6.18-etch-security: N/A
+2.6.8-sarge-security: N/A
+2.4.27-sarge-security: N/A
+2.6.15-dapper-security: ignored
+2.6.17-edgy-security: ignored - no upstream fix.
+2.6.20-feisty-security: ignored - no upstream fix.
More information about the kernel-sec-discuss
mailing list