summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2006-1856
diff options
context:
space:
mode:
authordann frazier <dannf@debian.org>2006-09-26 05:25:01 +0000
committerdann frazier <dannf@debian.org>2006-09-26 05:25:01 +0000
commitb5dff88447542aeaeb052e46ac5a81f56b13b47b (patch)
treef208d9fb748aff5b1a6082182f77bd7a1bb2df9b /retired/CVE-2006-1856
parent708584120cba90a6f017432e2ee45d9c5c1859dc (diff)
retire all issues that have been fixed upstream and in all listed kernels that are affected
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@600 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2006-1856')
-rw-r--r--retired/CVE-2006-185616
1 files changed, 16 insertions, 0 deletions
diff --git a/retired/CVE-2006-1856 b/retired/CVE-2006-1856
new file mode 100644
index 00000000..05a0b63b
--- /dev/null
+++ b/retired/CVE-2006-1856
@@ -0,0 +1,16 @@
+Candidate: CVE-2006-1856
+References:
+ Certain modifications to the Linux kernel 2.6.16 and earlier do not
+ add the appropriate Linux Security Modules (LSM) file_permission hooks
+ to the (1) readv and (2) writev functions, which might allow attackers
+ to bypass intended access restrictions.
+Description:
+ http://lists.jammed.com/linux-security-module/2005/09/0019.html
+ http://www.ussg.iu.edu/hypermail/linux/kernel/0604.3/0777.html
+ https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=191524
+Notes:
+Bugs:
+upstream: released (2.6.17)
+linux-2.6: released (2.6.17-1)
+2.6.8-sarge-security: released (2.6.8-16sarge5) [readv-writev-missing-lsm-check.dpatch, readv-writev-missing-lsm-check-compat.dpatch]
+2.4.27-sarge-security: N/A

© 2014-2024 Faster IT GmbH | imprint | privacy policy