diff options
author | dann frazier <dannf@debian.org> | 2006-09-26 05:25:01 +0000 |
---|---|---|
committer | dann frazier <dannf@debian.org> | 2006-09-26 05:25:01 +0000 |
commit | b5dff88447542aeaeb052e46ac5a81f56b13b47b (patch) | |
tree | f208d9fb748aff5b1a6082182f77bd7a1bb2df9b /retired/CVE-2006-1856 | |
parent | 708584120cba90a6f017432e2ee45d9c5c1859dc (diff) |
retire all issues that have been fixed upstream and in all listed kernels that are affected
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@600 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2006-1856')
-rw-r--r-- | retired/CVE-2006-1856 | 16 |
1 files changed, 16 insertions, 0 deletions
diff --git a/retired/CVE-2006-1856 b/retired/CVE-2006-1856 new file mode 100644 index 00000000..05a0b63b --- /dev/null +++ b/retired/CVE-2006-1856 @@ -0,0 +1,16 @@ +Candidate: CVE-2006-1856 +References: + Certain modifications to the Linux kernel 2.6.16 and earlier do not + add the appropriate Linux Security Modules (LSM) file_permission hooks + to the (1) readv and (2) writev functions, which might allow attackers + to bypass intended access restrictions. +Description: + http://lists.jammed.com/linux-security-module/2005/09/0019.html + http://www.ussg.iu.edu/hypermail/linux/kernel/0604.3/0777.html + https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=191524 +Notes: +Bugs: +upstream: released (2.6.17) +linux-2.6: released (2.6.17-1) +2.6.8-sarge-security: released (2.6.8-16sarge5) [readv-writev-missing-lsm-check.dpatch, readv-writev-missing-lsm-check-compat.dpatch] +2.4.27-sarge-security: N/A |