diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2010-01-31 11:37:57 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2010-01-31 11:37:57 +0000 |
commit | 1c12ee4ee9dac6c9573cf1bcc8ba5f474cd694bf (patch) | |
tree | a18afad24af3e4da53849c467e74a1b8efb310a8 /ignored/CVE-2006-6921 | |
parent | d40a48ce02ebc18791cf1519933784c802322b53 (diff) |
ignore two ancient issues
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1687 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'ignored/CVE-2006-6921')
-rw-r--r-- | ignored/CVE-2006-6921 | 24 |
1 files changed, 24 insertions, 0 deletions
diff --git a/ignored/CVE-2006-6921 b/ignored/CVE-2006-6921 new file mode 100644 index 00000000..3a3ee39a --- /dev/null +++ b/ignored/CVE-2006-6921 @@ -0,0 +1,24 @@ +Candidate: CVE-2006-6921 +References: + http://uwsg.iu.edu/hypermail/linux/kernel/0612.2/0980.html + http://uwsg.iu.edu/hypermail/linux/kernel/0612.2/1021.html +Description: + Unspecified versions of the Linux kernel allows local users to cause + a denial of service (unrecoverable zombie process) via a program with + certain instructions that prevent init from properly reaping a child + whose parent has died. +Ubuntu-Description: +Notes: + 2.4 behaves correctly + dannf> unaware of an upstream fix +Bugs: +upstream: +linux-2.6: ignored "no upstream fix" +2.6.18-etch-security: ignored (2.6.18.dfsg.1-13etch6) "no upstream fix" +2.6.24-etch-security: ignored "no upstream fix" +2.6.26-lenny-security: ignored +2.6.8-sarge-security: ignored (2.6.8-16sarge7) +2.4.27-sarge-security: N/A +2.6.15-dapper-security: ignored +2.6.17-edgy-security: ignored - no upstream patch +2.6.20-feisty-security: ignored |