summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2006-5648
blob: 1c77607283d6102511b5a3f9704a36fd8e1e712b (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
Candidate: CVE-2006-5648
References: 
 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=69588298188b40ed7f75c98a6fd328d82f23ca21
Description: 
 The sys_[gs]et_robust_list() syscalls were wired up on PowerPC but
 didn't work correctly because futex_atomic_cmpxchg_inatomic() wasn't
 implemented.  Implement it, based on __cmpxchg_u32().
Ubuntu-Description:
 Fabio Massimo Di Nitto discovered that the sys_get_robust_list and
 sys_set_robust_list system calls lacked proper lock handling on the
 powerpc platform. A local attacker could exploit this to create
 unkillable processes, drain all available CPU/memory, and render the
 machine unrebootable.
Notes: 
 http://ozlabs.org/pipermail/linuxppc-dev/2006-October/027338.html
 dannf> Looks like sparc is also vulnerable in 2.6.18, see:
        http://lists.debian.org/debian-kernel/2006/12/msg00787.html
        But, as this is a powerpc specific CVE, I'll mark Debian as ok
Bugs: 
upstream: released (2.6.18)
linux-2.6: released (2.6.18-1)
2.6.18-etch-security: N/A
2.6.8-sarge-security: N/A
2.4.27-sarge-security: N/A
2.6.12-breezy-security: N/A
2.6.15-dapper-security: N/A
2.6.17-edgy-security: released (2.6.17.1-10.34)
2.6.19-feisty: released

© 2014-2024 Faster IT GmbH | imprint | privacy policy