summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2005-1763
diff options
context:
space:
mode:
authordann frazier <dannf@debian.org>2008-01-28 23:27:20 +0000
committerdann frazier <dannf@debian.org>2008-01-28 23:27:20 +0000
commitb1a65604c81e77bcba6c6a30e49fdd236b7d316c (patch)
treee422a174177b9cbaf7c422c4e178d8316079ada5 /retired/CVE-2005-1763
parentce520f68ab23c967cccb1b3abc379d4431d8e54d (diff)
mark as x86_64 specific and retire
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1110 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2005-1763')
-rw-r--r--retired/CVE-2005-176316
1 files changed, 16 insertions, 0 deletions
diff --git a/retired/CVE-2005-1763 b/retired/CVE-2005-1763
new file mode 100644
index 00000000..d68f74d7
--- /dev/null
+++ b/retired/CVE-2005-1763
@@ -0,0 +1,16 @@
+Candidate: CVE-2005-1763
+References:
+ http://www.novell.com/linux/security/advisories/2005_29_kernel.html
+Description:
+ Buffer overflow in ptrace in the Linux Kernel for 64-bit architectures allows
+ local users to write bytes into kernel memory.
+Notes:
+ dannf> The patch we have is only for x86_64. This code was very different
+ dannf> in 2.4, and we don't ship 2.4/amd64, so we can probably drop this one.
+Bugs:
+upstream: released (2.6.12-rc5)
+linux-2.6: N/A
+2.6.8-sarge-security: released (2.6.8-16sarge1) [arch-x86_64-kernel-ptrace-boundary-check.dpatch]
+2.4.27-sarge-security: ignored "no amd64/2.4 kernel"
+2.6.18-etch-security: N/A
+

© 2014-2024 Faster IT GmbH | imprint | privacy policy