[kernel] r6515 - patch-tracking

Dann Frazier dannf at costa.debian.org
Mon May 1 15:02:16 UTC 2006


Author: dannf
Date: Mon May  1 15:02:15 2006
New Revision: 6515

Added:
   patch-tracking/CVE-2006-0558
      - copied, changed from r6513, /patch-tracking/00boilerplate

Log:
add info

Copied: patch-tracking/CVE-2006-0558 (from r6513, /patch-tracking/00boilerplate)
==============================================================================
--- /patch-tracking/00boilerplate	(original)
+++ patch-tracking/CVE-2006-0558	Mon May  1 15:02:15 2006
@@ -1,10 +1,24 @@
-Candidate: 
+Candidate: CVE-2006-0558
 References: 
+ MLIST:[linux-ia64] [PATCH 1/1] ia64: perfmon.c trips BUG_ON in put_page_testzero
+ URL:http://marc.theaimsgroup.com/?l=linux-ia64&m=113882384921688
+ CONFIRM:https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=185082
+ BID:17482
+ URL:http://www.securityfocus.com/bid/17482 
 Description: 
+ perfmon (perfmon.c) in Linux kernel on IA64 architectures allows local users
+ to cause a denial of service (crash) by interrupting a task while another
+ process is accessing the mm_struct, which triggers a BUG_ON action in the
+ put_page_testzero function.proc
 Notes: 
-Bugs: 
-upstream: 
-linux-2.6:
+ dannf> This issue is unreproducible in 2.6.16, according to:
+ dannf>  http://marc.theaimsgroup.com/?l=linux-ia64&m=114530938403347&w=2
+ dannf> So, I'm marking uptream as 2.6.16
+ .
+ dannf> There is a reproducer; I'll try to reproduce on our sarge kernels
+Bugs: 365375
+upstream: released (2.6.16)
+linux-2.6: released (2.6.16-1)
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 
 2.4.27:



More information about the Kernel-svn-changes mailing list