diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2007-04-29 20:57:47 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2007-04-29 20:57:47 +0000 |
commit | 21c59bcd8cdcebba2a3303201b09153f69ecea25 (patch) | |
tree | 993d2bbcaff2bd0d956d88b849d968cf70d9abdb /active | |
parent | 29cb34468f70a7ce94d64ff8ee0360e95c2b9f6f (diff) |
retire CVE-2006-2935
more etch updates
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@771 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'active')
-rw-r--r-- | active/CVE-2005-3044 | 1 | ||||
-rw-r--r-- | active/CVE-2006-2275 | 2 | ||||
-rw-r--r-- | active/CVE-2006-2446 | 1 | ||||
-rw-r--r-- | active/CVE-2006-2448 | 2 | ||||
-rw-r--r-- | active/CVE-2006-2935 | 25 |
5 files changed, 6 insertions, 25 deletions
diff --git a/active/CVE-2005-3044 b/active/CVE-2005-3044 index 08adeab9..1ad34f97 100644 --- a/active/CVE-2005-3044 +++ b/active/CVE-2005-3044 @@ -26,3 +26,4 @@ upstream: released (2.6.13.2) linux-2.6: released (2.6.12-7, 2.6.13-1) [lost-fput-in-32bit-ioctl-on-x86-64.patch, linux-2.6.13.2.patch] 2.6.8-sarge-security: released (2.6.8-16sarge2) [lost-fput-in-32bit-ioctl-on-x86-64.dpatch, lost-sockfd_put-in-32bit-compat-routing_ioctl.patch] 2.4.27-sarge-security: ignored (2.4.27-10sarge4) +2.6.18-etch-security: N/A diff --git a/active/CVE-2006-2275 b/active/CVE-2006-2275 index 4fb30aee..5a9a9c7b 100644 --- a/active/CVE-2006-2275 +++ b/active/CVE-2006-2275 @@ -15,3 +15,5 @@ upstream: released (2.6.16.15) linux-2.6: released (2.6.16-13) 2.6.8-sarge-security: ignored (2.6.8-16sarge4) 2.4.27-sarge-security: ignored (2.4.27-10sarge4) +2.6.18-etch-security: N/A + diff --git a/active/CVE-2006-2446 b/active/CVE-2006-2446 index e5c09f0b..e95121d7 100644 --- a/active/CVE-2006-2446 +++ b/active/CVE-2006-2446 @@ -21,3 +21,4 @@ linux-2.6: 2.6.12-breezy-security: N/A 2.6.15-dapper-security: N/A 2.6.17-edgy: N/A +2.6.18-etch-security: diff --git a/active/CVE-2006-2448 b/active/CVE-2006-2448 index e3b4ee58..e345f7e2 100644 --- a/active/CVE-2006-2448 +++ b/active/CVE-2006-2448 @@ -15,3 +15,5 @@ upstream: released (2.6.16.21) linux-2.6: released (2.6.16-15) 2.6.8-sarge-security: ignored (2.6.8-16sarge5) 2.4.27-sarge-security: ignored (2.4.27-10sarge4) +2.6.18-etch-security: N/A + diff --git a/active/CVE-2006-2935 b/active/CVE-2006-2935 deleted file mode 100644 index 3a997ebd..00000000 --- a/active/CVE-2006-2935 +++ /dev/null @@ -1,25 +0,0 @@ -Candidate: CVE-2006-2935 -References: - http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=454d6fbc48374be8f53b9bafaa86530cf8eb3bc1 -Description: - The dvd_read_bca function in the DVD handling code in drivers/cdrom/cdrom.c - in Linux kernel 2.2.16, and later versions, assigns the wrong value to a - length variable, which allows local users to execute arbitrary code via a - crafted USB Storage device that triggers a buffer overflow. -Ubuntu-Description: - A buffer overflow has been discovered in the dvd_read_bca() function. - By inserting a specially crafted DVD, USB stick, or similar - automatically mounted removable device, a local user could crash the - machine or potentially even execute arbitrary code with full root - privileges. -Notes: - dannf> Submitted to Adrian Bunk for inclusion in 2.6.16.y -Bugs: -upstream: released (2.6.17.7) -linux-2.6: released (2.6.17-5) -2.6.8-sarge-security: released (2.6.8-16sarge5) [cdrom-bad-cgc.buflen-assign.dpatch] -2.4.27-sarge-security: released (2.4.27-10sarge4) [224_cdrom-bad-cgc.buflen-assign.diff] -2.6.10-hoary-security: released (2.6.10-34.23) -2.6.12-breezy-security: released (2.6.12-10.37) -2.6.15-dapper-security: released (2.6.15-26.46) -2.6.17-edgy: released (2.6.17-10.30) |