diff options
author | dann frazier <dannf@debian.org> | 2006-08-17 00:24:25 +0000 |
---|---|---|
committer | dann frazier <dannf@debian.org> | 2006-08-17 00:24:25 +0000 |
commit | f3581ec9b2d48c6103c22fecb46f713217d834e8 (patch) | |
tree | 16359328df8385089d75b771a15c849bc9d052ea /retired/CVE-2005-1765 | |
parent | fcaf6d1f99829e04e46b5eb27e1aac3451308455 (diff) |
move retired to the top level hierarchy so people can easily checkout just the active issues
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@548 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2005-1765')
-rw-r--r-- | retired/CVE-2005-1765 | 24 |
1 files changed, 24 insertions, 0 deletions
diff --git a/retired/CVE-2005-1765 b/retired/CVE-2005-1765 new file mode 100644 index 00000000..f17d7dbc --- /dev/null +++ b/retired/CVE-2005-1765 @@ -0,0 +1,24 @@ +Candidate: CVE-2005-1765 +References: + http://www.novell.com/linux/security/advisories/2005_29_kernel.html + http://www.ubuntulinux.org/support/documentation/usn/usn-143-1 +Description: + syscall in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform, + when running in 32-bit compatibility mode, allows local users to cause + a denial of service (kernel hang) via crafted arguments. +Notes: + jmm> I've extracted the patch from the Ubuntu update (CVE-2005-1765.patch) + dannf> This code was very different in 2.4, and we don't ship 2.4/amd64, so + I'll mark 2.4 N/A +Bugs: +upstream: +linux-2.6: +2.6.8-sarge-security: released (2.6.8-16sarge1) [arch-x86_64-mm-mmap.dpatch] +2.4.27-sarge-security: N/A +2.4.19-woody-security: N/A +2.4.18-woody-security: N/A +2.4.17-woody-security: N/A +2.4.16-woody-security: N/A +2.4.17-woody-security-hppa: N/A +2.4.17-woody-security-ia64: N/A +2.4.18-woody-security-hppa: N/A |