diff options
author | dann frazier <dannf@debian.org> | 2006-08-17 00:24:25 +0000 |
---|---|---|
committer | dann frazier <dannf@debian.org> | 2006-08-17 00:24:25 +0000 |
commit | f3581ec9b2d48c6103c22fecb46f713217d834e8 (patch) | |
tree | 16359328df8385089d75b771a15c849bc9d052ea /retired/CVE-2005-1768 | |
parent | fcaf6d1f99829e04e46b5eb27e1aac3451308455 (diff) |
move retired to the top level hierarchy so people can easily checkout just the active issues
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@548 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2005-1768')
-rw-r--r-- | retired/CVE-2005-1768 | 34 |
1 files changed, 34 insertions, 0 deletions
diff --git a/retired/CVE-2005-1768 b/retired/CVE-2005-1768 new file mode 100644 index 00000000..00eb2833 --- /dev/null +++ b/retired/CVE-2005-1768 @@ -0,0 +1,34 @@ +Candidate: CVE-2005-1768 +References: + URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1768 + Final-Decision: + Interim-Decision: + Modified: + Proposed: + Assigned: 20050531 + Category: SF + BUGTRAQ:20050711 [ Suresec Advisories ] - Linux kernel ia32 compatibility (ia64/x86-64) + URL:http://marc.theaimsgroup.com/?l=bugtraq&m=112110120216116&w=2 + MISC:http://www.suresec.org/advisories/adv4.pdf +Description: + Race condition in the ia32 compatibility code for the execve system + call in Linux kernel 2.4 before 2.4.31 and 2.6 before 2.6.6 allows + local users to cause a denial of service (kernel panic) and possibly + execute arbitrary code via a concurrent thread that increments a + pointer count after the nargs function has counted the pointers, but + before the count is copied from user space to kernel space, which + leads to a buffer overflow. +Notes: + 167_arch-ia64-x86_64_execve.diff (note 2.4 is not supported for amd64) +upstream: released (2.4.31, 2.6.6) +2.6.8-sarge-security: N/A +2.4.27-sid/sarge: released (2.4.27-11) +2.4.27-sarge-security: released (2.4.27-10sarge1) +linux-2.6: N/A +2.4.19-woody-security: +2.4.18-woody-security: +2.4.17-woody-security: +2.4.16-woody-security: +2.4.17-woody-security-hppa: +2.4.17-woody-security-ia64: +2.4.18-woody-security-hppa: |