[kernel] r6515 - patch-tracking
Dann Frazier
dannf at costa.debian.org
Mon May 1 15:02:16 UTC 2006
Author: dannf
Date: Mon May 1 15:02:15 2006
New Revision: 6515
Added:
patch-tracking/CVE-2006-0558
- copied, changed from r6513, /patch-tracking/00boilerplate
Log:
add info
Copied: patch-tracking/CVE-2006-0558 (from r6513, /patch-tracking/00boilerplate)
==============================================================================
--- /patch-tracking/00boilerplate (original)
+++ patch-tracking/CVE-2006-0558 Mon May 1 15:02:15 2006
@@ -1,10 +1,24 @@
-Candidate:
+Candidate: CVE-2006-0558
References:
+ MLIST:[linux-ia64] [PATCH 1/1] ia64: perfmon.c trips BUG_ON in put_page_testzero
+ URL:http://marc.theaimsgroup.com/?l=linux-ia64&m=113882384921688
+ CONFIRM:https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=185082
+ BID:17482
+ URL:http://www.securityfocus.com/bid/17482
Description:
+ perfmon (perfmon.c) in Linux kernel on IA64 architectures allows local users
+ to cause a denial of service (crash) by interrupting a task while another
+ process is accessing the mm_struct, which triggers a BUG_ON action in the
+ put_page_testzero function.proc
Notes:
-Bugs:
-upstream:
-linux-2.6:
+ dannf> This issue is unreproducible in 2.6.16, according to:
+ dannf> http://marc.theaimsgroup.com/?l=linux-ia64&m=114530938403347&w=2
+ dannf> So, I'm marking uptream as 2.6.16
+ .
+ dannf> There is a reproducer; I'll try to reproduce on our sarge kernels
+Bugs: 365375
+upstream: released (2.6.16)
+linux-2.6: released (2.6.16-1)
2.6.8-sarge-security:
2.4.27-sarge-security:
2.4.27:
More information about the Kernel-svn-changes
mailing list