[kernel-sec-discuss] r1109 - active retired

dannf at alioth.debian.org dannf at alioth.debian.org
Tue Jan 22 16:14:23 UTC 2008


Author: dannf
Date: 2008-01-22 16:14:23 +0000 (Tue, 22 Jan 2008)
New Revision: 1109

Added:
   retired/CVE-2006-6128
Removed:
   active/CVE-2006-6128
Log:
retire CVE-2006-6128

Deleted: active/CVE-2006-6128
===================================================================
--- active/CVE-2006-6128	2008-01-22 16:14:06 UTC (rev 1108)
+++ active/CVE-2006-6128	2008-01-22 16:14:23 UTC (rev 1109)
@@ -1,30 +0,0 @@
-Candidate: CVE-2006-6128
-References: 
- MISC:http://projects.info-pull.com/mokb/MOKB-25-11-2006.html
- FRSIRT:ADV-2006-4716
- URL:http://www.frsirt.com/english/advisories/2006/4716
- SECUNIA:23093
- URL:http://secunia.com/advisories/23093
- XF:linux-reiserfs-dos(30551)
- URL:http://xforce.iss.net/xforce/xfdb/30551 
-Description: 
- The ReiserFS functionality in Linux kernel 2.6.18, and possibly other
- versions, allows local users to cause a denial of service via a malformed
- ReiserFS file system that triggers memory corruption when a sync is performed.
-Ubuntu-Description: 
-Notes: 
- dannf> low impact; no known upstream fix
- jmm> ignored, only exploitable with manipulated fs images, for which mount
- jmm> privs are needed
- dannf> https://bugzilla.redhat.com/show_bug.cgi?id=250625 suggests this
-        maybe fedora-specific. Indeed, I cannot reproduce w/ the MOKB fs
-        any of the Debian kernels
-Bugs: 
-upstream: N/A
-linux-2.6: N/A
-2.6.18-etch-security: N/A
-2.6.8-sarge-security: N/A
-2.4.27-sarge-security: N/A
-2.6.15-dapper-security: ignored
-2.6.17-edgy-security: ignored - no upstream fix.
-2.6.20-feisty-security: ignored - no upstream fix.

Copied: retired/CVE-2006-6128 (from rev 1108, active/CVE-2006-6128)
===================================================================
--- retired/CVE-2006-6128	                        (rev 0)
+++ retired/CVE-2006-6128	2008-01-22 16:14:23 UTC (rev 1109)
@@ -0,0 +1,30 @@
+Candidate: CVE-2006-6128
+References: 
+ MISC:http://projects.info-pull.com/mokb/MOKB-25-11-2006.html
+ FRSIRT:ADV-2006-4716
+ URL:http://www.frsirt.com/english/advisories/2006/4716
+ SECUNIA:23093
+ URL:http://secunia.com/advisories/23093
+ XF:linux-reiserfs-dos(30551)
+ URL:http://xforce.iss.net/xforce/xfdb/30551 
+Description: 
+ The ReiserFS functionality in Linux kernel 2.6.18, and possibly other
+ versions, allows local users to cause a denial of service via a malformed
+ ReiserFS file system that triggers memory corruption when a sync is performed.
+Ubuntu-Description: 
+Notes: 
+ dannf> low impact; no known upstream fix
+ jmm> ignored, only exploitable with manipulated fs images, for which mount
+ jmm> privs are needed
+ dannf> https://bugzilla.redhat.com/show_bug.cgi?id=250625 suggests this
+        maybe fedora-specific. Indeed, I cannot reproduce w/ the MOKB fs
+        any of the Debian kernels
+Bugs: 
+upstream: N/A
+linux-2.6: N/A
+2.6.18-etch-security: N/A
+2.6.8-sarge-security: N/A
+2.4.27-sarge-security: N/A
+2.6.15-dapper-security: ignored
+2.6.17-edgy-security: ignored - no upstream fix.
+2.6.20-feisty-security: ignored - no upstream fix.




More information about the kernel-sec-discuss mailing list