diff options
author | dann frazier <dannf@debian.org> | 2006-08-17 00:24:25 +0000 |
---|---|---|
committer | dann frazier <dannf@debian.org> | 2006-08-17 00:24:25 +0000 |
commit | f3581ec9b2d48c6103c22fecb46f713217d834e8 (patch) | |
tree | 16359328df8385089d75b771a15c849bc9d052ea /retired/CVE-2006-0741 | |
parent | fcaf6d1f99829e04e46b5eb27e1aac3451308455 (diff) |
move retired to the top level hierarchy so people can easily checkout just the active issues
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@548 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2006-0741')
-rw-r--r-- | retired/CVE-2006-0741 | 20 |
1 files changed, 20 insertions, 0 deletions
diff --git a/retired/CVE-2006-0741 b/retired/CVE-2006-0741 new file mode 100644 index 00000000..0fcd6859 --- /dev/null +++ b/retired/CVE-2006-0741 @@ -0,0 +1,20 @@ +Candidate: CVE-2006-0741 +References: +Description: + Fixes a local DOS on Intel systems that lead to an endless +recursive fault. AMD machines don't seem to be affected. +Notes: + 2.6: http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=5342fba5412cead88b61ead07168615dbeba1ee3 + . + This is amd64-specific (em64t in particular), so we could ignore it for 2.4 +Bugs: +upstream: released (2.6.15.5) +linux-2.6: released (2.6.15-8) +2.6.8-sarge-security: released (2.6.8-16sarge3) [binfmt-bad-elf-entry-address.dpatch] +2.4.27-sarge-security: released (2.4.27-10sarge3) [222_binfmt-bad-elf-entry-address.diff] +2.4.19-woody-security: N/A +2.4.18-woody-security: N/A +2.4.17-woody-security: N/A +2.4.16-woody-security: N/A +2.4.17-woody-security-hppa: N/A +2.4.17-woody-security-ia64: N/A |