From 6471f3dab8b9f08bf043c1fcc49f8a0bf467300a Mon Sep 17 00:00:00 2001 From: Moritz Muehlenhoff Date: Mon, 30 Apr 2007 17:08:05 +0000 Subject: retire several issues git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@774 e094ebfe-e918-0410-adfb-c712417f3574 --- retired/CVE-2006-5648 | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 retired/CVE-2006-5648 (limited to 'retired/CVE-2006-5648') diff --git a/retired/CVE-2006-5648 b/retired/CVE-2006-5648 new file mode 100644 index 000000000..1c7760728 --- /dev/null +++ b/retired/CVE-2006-5648 @@ -0,0 +1,28 @@ +Candidate: CVE-2006-5648 +References: + http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=69588298188b40ed7f75c98a6fd328d82f23ca21 +Description: + The sys_[gs]et_robust_list() syscalls were wired up on PowerPC but + didn't work correctly because futex_atomic_cmpxchg_inatomic() wasn't + implemented. Implement it, based on __cmpxchg_u32(). +Ubuntu-Description: + Fabio Massimo Di Nitto discovered that the sys_get_robust_list and + sys_set_robust_list system calls lacked proper lock handling on the + powerpc platform. A local attacker could exploit this to create + unkillable processes, drain all available CPU/memory, and render the + machine unrebootable. +Notes: + http://ozlabs.org/pipermail/linuxppc-dev/2006-October/027338.html + dannf> Looks like sparc is also vulnerable in 2.6.18, see: + http://lists.debian.org/debian-kernel/2006/12/msg00787.html + But, as this is a powerpc specific CVE, I'll mark Debian as ok +Bugs: +upstream: released (2.6.18) +linux-2.6: released (2.6.18-1) +2.6.18-etch-security: N/A +2.6.8-sarge-security: N/A +2.4.27-sarge-security: N/A +2.6.12-breezy-security: N/A +2.6.15-dapper-security: N/A +2.6.17-edgy-security: released (2.6.17.1-10.34) +2.6.19-feisty: released -- cgit v1.2.3