From eda072bc797695ca1d67a1c6af4a72ce737db2cf Mon Sep 17 00:00:00 2001 From: Kees Cook Date: Wed, 21 Nov 2007 22:17:58 +0000 Subject: re-activating CVE-2006-6058 since there is a work-around upstream git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1023 e094ebfe-e918-0410-adfb-c712417f3574 --- ignored/CVE-2006-6058 | 29 ----------------------------- 1 file changed, 29 deletions(-) delete mode 100644 ignored/CVE-2006-6058 (limited to 'ignored') diff --git a/ignored/CVE-2006-6058 b/ignored/CVE-2006-6058 deleted file mode 100644 index 85686e2c..00000000 --- a/ignored/CVE-2006-6058 +++ /dev/null @@ -1,29 +0,0 @@ -Candidate: CVE-2006-6058 -References: - http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.23.y.git;a=commitdiff;h=f0ae3188daf70ed07a4dfbeb133bef3a92838a15 - MISC:http://projects.info-pull.com/mokb/MOKB-17-11-2006.html - FRSIRT:ADV-2006-4613 - URL:http://www.frsirt.com/english/advisories/2006/4613 - SECUNIA:23034 - URL:http://secunia.com/advisories/23034 -Description: - The minix filesystem code in Linux kernel 2.6.x up to 2.6.18, and possibly - other versions, allows local users to cause a denial of service (hang) via a - malformed minix file stream that triggers an infinite loop in the minix_bmap - function. NOTE: this issue might be due to an integer overflow or signedness - error. -Ubuntu-Description: -Notes: - dannf> ignored for sarge for now - only applies under very rare circumstances - and don't know if there's an upstream fix - jmm> We can ignore this, it has no practical ramifications -Bugs: -upstream: released (2.6.23.2) -linux-2.6: ignored -2.6.18-etch-security: ignored -2.6.8-sarge-security: ignored -2.4.27-sarge-security: ignored -2.6.15-dapper-security: needed -2.6.17-edgy-security: needed -2.6.20-feisty-security: needed -2.6.22-gutsy-security: needed -- cgit v1.2.3