diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2008-04-04 08:22:59 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2008-04-04 08:22:59 +0000 |
commit | e824eab7fea625551e3ee27c390cf894cfbfba04 (patch) | |
tree | 239de3139175e9b98d4e2a45e1962aa10beb2e92 /retired/CVE-2006-2448 | |
parent | 60ddf7542af3875373d9827c167f1d51926a8f6d (diff) |
retire some issues now that Sarge support has ended
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1154 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2006-2448')
-rw-r--r-- | retired/CVE-2006-2448 | 19 |
1 files changed, 19 insertions, 0 deletions
diff --git a/retired/CVE-2006-2448 b/retired/CVE-2006-2448 new file mode 100644 index 00000000..e345f7e2 --- /dev/null +++ b/retired/CVE-2006-2448 @@ -0,0 +1,19 @@ +Candidate: CVE-2006-2448 +References: + http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=7c85d1f9d358b24c5b05c3a2783a78423775a080 +Description: + Linux kernel before 2.6.16.21 and 2.6.17, when running on PowerPC, does not + perform certain required access_ok checks, which allows local users to read + arbitrary kernel memory on 64-bit systems (signal_64.c) and cause a denial of + service (crash) and possibly read kernel memory on 32-bit systems + (signal_32.c). +Notes: + dannf> Code has changed significantly since 2.6.8, its not clear to me + if this fix is needed or how to apply it. +Bugs: +upstream: released (2.6.16.21) +linux-2.6: released (2.6.16-15) +2.6.8-sarge-security: ignored (2.6.8-16sarge5) +2.4.27-sarge-security: ignored (2.4.27-10sarge4) +2.6.18-etch-security: N/A + |