linux-fsdevel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* Unpatched secunia advisories
@ 2007-01-17 17:56 Majkls
  0 siblings, 0 replies; only message in thread
From: Majkls @ 2007-01-17 17:56 UTC (permalink / raw)
  To: linux-fsdevel

Hello,
some time ago I sent some open advisory there, but in fact it had been
already fixed. So I want to continue in this chase on open advisories
and closed bugs. So there is some from FS:

CVE-2006-2629 - Race condition in Linux kernel 2.6.15 to 2.6.17, when
running on SMP platforms, allows local users to cause a denial of
service (crash) by creating and exiting a large number of tasks, then
accessing the /proc entry of a task that is exiting, which causes memory
corruption that leads to a failure in the prune_dcache function or a
BUG_ON error in include/linux/list.h.
= What is status of this bug? (in all 2.6 forks)

I also suppose this bug has been fixed in all 2.6 branches allready:
CVE-2004-1235 (http://secunia.com/advisories/13756/)

What is status of this bug:
http://secunia.com/cve_reference/CVE-2004-1058/

This has been already fixed, hasn't it?
http://secunia.com/advisories/13126/
CVE-2004-1070, CVE-2004-1071, CVE-2004-1072, CVE-2004-1073

http://secunia.com/advisories/12426/ - Has already been this bug fixed?

http://secunia.com/advisories/12210/ - Linux Kernel File Offset Pointer
Handling Memory Disclosure Vulnerability. On secunia is that is fixed
only in 2.4.

If you want reply that have been already fixed, please attach link to
main git repository on kernel.org.


-- 
Miloslav "Majkls" Semler

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2007-01-17 18:17 UTC | newest]

Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2007-01-17 17:56 Unpatched secunia advisories Majkls

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).