diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2007-05-01 00:29:30 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2007-05-01 00:29:30 +0000 |
commit | 9c1247fb2faebe751ab9bcbf4638bdfc0cf4c505 (patch) | |
tree | aa637ec551aa0434f6b5aa012f7584905c52bb81 /retired/CVE-2006-0744 | |
parent | 0d1a87cbe1489e81c19d383bcc8458473e4c20ad (diff) |
retire CVE-2006-0744
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@800 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2006-0744')
-rw-r--r-- | retired/CVE-2006-0744 | 14 |
1 files changed, 14 insertions, 0 deletions
diff --git a/retired/CVE-2006-0744 b/retired/CVE-2006-0744 new file mode 100644 index 000000000..78d5b2cdb --- /dev/null +++ b/retired/CVE-2006-0744 @@ -0,0 +1,14 @@ +Candidate: CVE-2006-0744 +References: +Description: + signal catching issue on em64t; similar to CVE-2006-0741 +Notes: + dannf> looks like redhat has developed a patch for their 2.4 + . + dannf> no upstream 2.4 fix, and it is amd64-specific, so N/A for 2.4/sarge3 +Bugs: +upstream: released (2.6.17) +linux-2.6: released (2.6.16-7) +2.6.8-sarge-security: released (2.6.8-16sarge3) [em64t-uncanonical-return-addr.dpatch] +2.4.27-sarge-security: N/A +2.6.18-etch-security: N/A |