diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2007-05-27 15:33:24 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2007-05-27 15:33:24 +0000 |
commit | 1ddc19aa57a95daa3360f75d53531b61c3172982 (patch) | |
tree | bb7da21f8e2535343bed301167d4d84598cfe1db /retired/CVE-2006-6058 | |
parent | c20a11308ef3d5af7a6584f52994e1939d4c3a0e (diff) |
ignore CVE-2007-1217
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@839 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2006-6058')
-rw-r--r-- | retired/CVE-2006-6058 | 26 |
1 files changed, 26 insertions, 0 deletions
diff --git a/retired/CVE-2006-6058 b/retired/CVE-2006-6058 new file mode 100644 index 000000000..f3610b89a --- /dev/null +++ b/retired/CVE-2006-6058 @@ -0,0 +1,26 @@ +Candidate: CVE-2006-6058 +References: + MISC:http://projects.info-pull.com/mokb/MOKB-17-11-2006.html + FRSIRT:ADV-2006-4613 + URL:http://www.frsirt.com/english/advisories/2006/4613 + SECUNIA:23034 + URL:http://secunia.com/advisories/23034 +Description: + The minix filesystem code in Linux kernel 2.6.x up to 2.6.18, and possibly + other versions, allows local users to cause a denial of service (hang) via a + malformed minix file stream that triggers an infinite loop in the minix_bmap + function. NOTE: this issue might be due to an integer overflow or signedness + error. +Ubuntu-Description: +Notes: + dannf> ignored for sarge for now - only applies under very rare circumstances + and don't know if there's an upstream fix + jmm> We can ignore this, it has no practical ramifications +Bugs: +upstream: +linux-2.6: ignored +2.6.18-etch-security: ignored +2.6.8-sarge-security: ignored +2.4.27-sarge-security: ignored +2.6.15-dapper-security: needed +2.6.17-edgy-security: needed |