diff options
author | dann frazier <dannf@debian.org> | 2008-01-28 23:27:20 +0000 |
---|---|---|
committer | dann frazier <dannf@debian.org> | 2008-01-28 23:27:20 +0000 |
commit | b1a65604c81e77bcba6c6a30e49fdd236b7d316c (patch) | |
tree | e422a174177b9cbaf7c422c4e178d8316079ada5 /retired/CVE-2005-1763 | |
parent | ce520f68ab23c967cccb1b3abc379d4431d8e54d (diff) |
mark as x86_64 specific and retire
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1110 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2005-1763')
-rw-r--r-- | retired/CVE-2005-1763 | 16 |
1 files changed, 16 insertions, 0 deletions
diff --git a/retired/CVE-2005-1763 b/retired/CVE-2005-1763 new file mode 100644 index 00000000..d68f74d7 --- /dev/null +++ b/retired/CVE-2005-1763 @@ -0,0 +1,16 @@ +Candidate: CVE-2005-1763 +References: + http://www.novell.com/linux/security/advisories/2005_29_kernel.html +Description: + Buffer overflow in ptrace in the Linux Kernel for 64-bit architectures allows + local users to write bytes into kernel memory. +Notes: + dannf> The patch we have is only for x86_64. This code was very different + dannf> in 2.4, and we don't ship 2.4/amd64, so we can probably drop this one. +Bugs: +upstream: released (2.6.12-rc5) +linux-2.6: N/A +2.6.8-sarge-security: released (2.6.8-16sarge1) [arch-x86_64-kernel-ptrace-boundary-check.dpatch] +2.4.27-sarge-security: ignored "no amd64/2.4 kernel" +2.6.18-etch-security: N/A + |