[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#480390: marked as done (linux-2.6: CVE-2008-1615 local denial of service on amd64)

Your message dated Wed, 14 May 2008 15:39:35 +0200
with message-id <20080514133935.GA13196@stro.at>
and subject line Re: linux-2.6: CVE-2008-1615 local denial of service on amd64
has caused the Debian Bug report #480390,
regarding linux-2.6: CVE-2008-1615 local denial of service on amd64
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org

480390: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480390
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: linux-2.6
Severity: grave
Tags: security

the following CVE (Common Vulnerabilities & Exposures) id was
published for linux-2.6.

| Linux kernel 2.6.18, and possibly other versions, when running on
| AMD64 architectures, allows local users to cause a denial of service
| (crash) via certain ptrace calls.

This issue affects the 2.6 kernels in Debian on amd64.

Steps to reproduce:
wget -O x86_64-cs.c http://sources.redhat.com/cgi-bin/cvsweb.cgi/~checkout~/tests/ptrace-tests/tests/x86_64-cs.c?cvsroot=systemtap
gcc -o x86_64-cs x86_64-cs.c -Wall -ggdb2 -D_GNU_SOURCE

Redhat used https://bugzilla.redhat.com/attachment.cgi?id=294062
to patch this, unfortunately this patch does not work for > 
2.6.24 and I have no idea about porting it.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1615

Nico Golde - http://www.ngolde.de - nion@jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpXjTrEUMFoY.pgp
Description: PGP signature

--- End Message ---
--- Begin Message ---
Version: 2.6.25-1

fixed in unstable, thus closing with appropriate versioning info.


--- End Message ---

Reply to: