summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2006-0744
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2007-05-01 00:29:30 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2007-05-01 00:29:30 +0000
commit9c1247fb2faebe751ab9bcbf4638bdfc0cf4c505 (patch)
treeaa637ec551aa0434f6b5aa012f7584905c52bb81 /retired/CVE-2006-0744
parent0d1a87cbe1489e81c19d383bcc8458473e4c20ad (diff)
retire CVE-2006-0744
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@800 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2006-0744')
-rw-r--r--retired/CVE-2006-074414
1 files changed, 14 insertions, 0 deletions
diff --git a/retired/CVE-2006-0744 b/retired/CVE-2006-0744
new file mode 100644
index 000000000..78d5b2cdb
--- /dev/null
+++ b/retired/CVE-2006-0744
@@ -0,0 +1,14 @@
+Candidate: CVE-2006-0744
+References:
+Description:
+ signal catching issue on em64t; similar to CVE-2006-0741
+Notes:
+ dannf> looks like redhat has developed a patch for their 2.4
+ .
+ dannf> no upstream 2.4 fix, and it is amd64-specific, so N/A for 2.4/sarge3
+Bugs:
+upstream: released (2.6.17)
+linux-2.6: released (2.6.16-7)
+2.6.8-sarge-security: released (2.6.8-16sarge3) [em64t-uncanonical-return-addr.dpatch]
+2.4.27-sarge-security: N/A
+2.6.18-etch-security: N/A

© 2014-2024 Faster IT GmbH | imprint | privacy policy