Candidate: CVE-2006-5648 References: http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=69588298188b40ed7f75c98a6fd328d82f23ca21 Description: The sys_[gs]et_robust_list() syscalls were wired up on PowerPC but didn't work correctly because futex_atomic_cmpxchg_inatomic() wasn't implemented. Implement it, based on __cmpxchg_u32(). Ubuntu-Description: Fabio Massimo Di Nitto discovered that the sys_get_robust_list and sys_set_robust_list system calls lacked proper lock handling on the powerpc platform. A local attacker could exploit this to create unkillable processes, drain all available CPU/memory, and render the machine unrebootable. Notes: http://ozlabs.org/pipermail/linuxppc-dev/2006-October/027338.html dannf> Looks like sparc is also vulnerable in 2.6.18, see: http://lists.debian.org/debian-kernel/2006/12/msg00787.html But, as this is a powerpc specific CVE, I'll mark Debian as ok Bugs: upstream: released (2.6.18) linux-2.6: released (2.6.18-1) 2.6.18-etch-security: N/A 2.6.8-sarge-security: N/A 2.4.27-sarge-security: N/A 2.6.12-breezy-security: N/A 2.6.15-dapper-security: N/A 2.6.17-edgy-security: released (2.6.17.1-10.34) 2.6.19-feisty: released