diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2009-05-19 08:52:02 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2009-05-19 08:52:02 +0000 |
commit | 99f97575a67307917c6cb4b9c33617e6a556c938 (patch) | |
tree | 6a949adfe2144e1dfe9e351aa37de155002d5ca0 /retired/CVE-2008-2358 | |
parent | 6d4c0a545277fc983a1f4002d6b5bec5a87abb33 (diff) |
retire issues
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1379 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2008-2358')
-rw-r--r-- | retired/CVE-2008-2358 | 23 |
1 files changed, 23 insertions, 0 deletions
diff --git a/retired/CVE-2008-2358 b/retired/CVE-2008-2358 new file mode 100644 index 00000000..298970a2 --- /dev/null +++ b/retired/CVE-2008-2358 @@ -0,0 +1,23 @@ +Candidate: CVE-2008-2358 +Description: + The Datagram Congestion Control Protocol (DCCP) subsystem in the Linux + kernel 2.6.18, and probably other versions, does not properly check + feature lengths, which might allow remote attackers to execute arbitrary + code, related to an unspecified "overflow." +References: +Ubuntu-Description: +Notes: + kees> linux-2.6: 19443178fbfbf40db15c86012fc37df1a44ab857 + dannf> Only effects 2.6.17-2.6.19, between + dannf> afe00251dd9b53d51de91ff0099961f42bbf3754 and + dannf> c02fdc0e81e9c735d8d895af1e201b235df326d8 +Bugs: +upstream: released (2.6.26) +linux-2.6: released (2.6.26-1) +2.6.18-etch-security: released (2.6.18.dfsg.1-18etch6) [bugfix/dccp-feature-length-check.patch] +2.6.24-etch-security: N/A +2.6.26-lenny-security: N/A +2.6.15-dapper-security: N/A +2.6.20-feisty-security: released (2.6.20-17.37) +2.6.22-gutsy-security: released (2.6.22-15.56) +2.6.24-hardy-security: released (2.6.24-19.36) |