summaryrefslogtreecommitdiffstats
path: root/active
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2007-04-29 20:57:47 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2007-04-29 20:57:47 +0000
commit21c59bcd8cdcebba2a3303201b09153f69ecea25 (patch)
tree993d2bbcaff2bd0d956d88b849d968cf70d9abdb /active
parent29cb34468f70a7ce94d64ff8ee0360e95c2b9f6f (diff)
retire CVE-2006-2935
more etch updates git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@771 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'active')
-rw-r--r--active/CVE-2005-30441
-rw-r--r--active/CVE-2006-22752
-rw-r--r--active/CVE-2006-24461
-rw-r--r--active/CVE-2006-24482
-rw-r--r--active/CVE-2006-293525
5 files changed, 6 insertions, 25 deletions
diff --git a/active/CVE-2005-3044 b/active/CVE-2005-3044
index 08adeab9..1ad34f97 100644
--- a/active/CVE-2005-3044
+++ b/active/CVE-2005-3044
@@ -26,3 +26,4 @@ upstream: released (2.6.13.2)
linux-2.6: released (2.6.12-7, 2.6.13-1) [lost-fput-in-32bit-ioctl-on-x86-64.patch, linux-2.6.13.2.patch]
2.6.8-sarge-security: released (2.6.8-16sarge2) [lost-fput-in-32bit-ioctl-on-x86-64.dpatch, lost-sockfd_put-in-32bit-compat-routing_ioctl.patch]
2.4.27-sarge-security: ignored (2.4.27-10sarge4)
+2.6.18-etch-security: N/A
diff --git a/active/CVE-2006-2275 b/active/CVE-2006-2275
index 4fb30aee..5a9a9c7b 100644
--- a/active/CVE-2006-2275
+++ b/active/CVE-2006-2275
@@ -15,3 +15,5 @@ upstream: released (2.6.16.15)
linux-2.6: released (2.6.16-13)
2.6.8-sarge-security: ignored (2.6.8-16sarge4)
2.4.27-sarge-security: ignored (2.4.27-10sarge4)
+2.6.18-etch-security: N/A
+
diff --git a/active/CVE-2006-2446 b/active/CVE-2006-2446
index e5c09f0b..e95121d7 100644
--- a/active/CVE-2006-2446
+++ b/active/CVE-2006-2446
@@ -21,3 +21,4 @@ linux-2.6:
2.6.12-breezy-security: N/A
2.6.15-dapper-security: N/A
2.6.17-edgy: N/A
+2.6.18-etch-security:
diff --git a/active/CVE-2006-2448 b/active/CVE-2006-2448
index e3b4ee58..e345f7e2 100644
--- a/active/CVE-2006-2448
+++ b/active/CVE-2006-2448
@@ -15,3 +15,5 @@ upstream: released (2.6.16.21)
linux-2.6: released (2.6.16-15)
2.6.8-sarge-security: ignored (2.6.8-16sarge5)
2.4.27-sarge-security: ignored (2.4.27-10sarge4)
+2.6.18-etch-security: N/A
+
diff --git a/active/CVE-2006-2935 b/active/CVE-2006-2935
deleted file mode 100644
index 3a997ebd..00000000
--- a/active/CVE-2006-2935
+++ /dev/null
@@ -1,25 +0,0 @@
-Candidate: CVE-2006-2935
-References:
- http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=454d6fbc48374be8f53b9bafaa86530cf8eb3bc1
-Description:
- The dvd_read_bca function in the DVD handling code in drivers/cdrom/cdrom.c
- in Linux kernel 2.2.16, and later versions, assigns the wrong value to a
- length variable, which allows local users to execute arbitrary code via a
- crafted USB Storage device that triggers a buffer overflow.
-Ubuntu-Description:
- A buffer overflow has been discovered in the dvd_read_bca() function.
- By inserting a specially crafted DVD, USB stick, or similar
- automatically mounted removable device, a local user could crash the
- machine or potentially even execute arbitrary code with full root
- privileges.
-Notes:
- dannf> Submitted to Adrian Bunk for inclusion in 2.6.16.y
-Bugs:
-upstream: released (2.6.17.7)
-linux-2.6: released (2.6.17-5)
-2.6.8-sarge-security: released (2.6.8-16sarge5) [cdrom-bad-cgc.buflen-assign.dpatch]
-2.4.27-sarge-security: released (2.4.27-10sarge4) [224_cdrom-bad-cgc.buflen-assign.diff]
-2.6.10-hoary-security: released (2.6.10-34.23)
-2.6.12-breezy-security: released (2.6.12-10.37)
-2.6.15-dapper-security: released (2.6.15-26.46)
-2.6.17-edgy: released (2.6.17-10.30)

© 2014-2024 Faster IT GmbH | imprint | privacy policy