diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2007-04-30 17:08:05 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2007-04-30 17:08:05 +0000 |
commit | 6471f3dab8b9f08bf043c1fcc49f8a0bf467300a (patch) | |
tree | 7dd98d6bb1c3629dde5999bcefede30fd9d5deee /retired/CVE-2006-5648 | |
parent | 8290df912ecbf23e19610e57952fc68c45d59103 (diff) |
retire several issues
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@774 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2006-5648')
-rw-r--r-- | retired/CVE-2006-5648 | 28 |
1 files changed, 28 insertions, 0 deletions
diff --git a/retired/CVE-2006-5648 b/retired/CVE-2006-5648 new file mode 100644 index 00000000..1c776072 --- /dev/null +++ b/retired/CVE-2006-5648 @@ -0,0 +1,28 @@ +Candidate: CVE-2006-5648 +References: + http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=69588298188b40ed7f75c98a6fd328d82f23ca21 +Description: + The sys_[gs]et_robust_list() syscalls were wired up on PowerPC but + didn't work correctly because futex_atomic_cmpxchg_inatomic() wasn't + implemented. Implement it, based on __cmpxchg_u32(). +Ubuntu-Description: + Fabio Massimo Di Nitto discovered that the sys_get_robust_list and + sys_set_robust_list system calls lacked proper lock handling on the + powerpc platform. A local attacker could exploit this to create + unkillable processes, drain all available CPU/memory, and render the + machine unrebootable. +Notes: + http://ozlabs.org/pipermail/linuxppc-dev/2006-October/027338.html + dannf> Looks like sparc is also vulnerable in 2.6.18, see: + http://lists.debian.org/debian-kernel/2006/12/msg00787.html + But, as this is a powerpc specific CVE, I'll mark Debian as ok +Bugs: +upstream: released (2.6.18) +linux-2.6: released (2.6.18-1) +2.6.18-etch-security: N/A +2.6.8-sarge-security: N/A +2.4.27-sarge-security: N/A +2.6.12-breezy-security: N/A +2.6.15-dapper-security: N/A +2.6.17-edgy-security: released (2.6.17.1-10.34) +2.6.19-feisty: released |