summaryrefslogtreecommitdiffstats
path: root/retired
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2009-05-19 08:52:02 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2009-05-19 08:52:02 +0000
commit99f97575a67307917c6cb4b9c33617e6a556c938 (patch)
tree6a949adfe2144e1dfe9e351aa37de155002d5ca0 /retired
parent6d4c0a545277fc983a1f4002d6b5bec5a87abb33 (diff)
retire issues
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1379 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired')
-rw-r--r--retired/CVE-2008-235823
-rw-r--r--retired/CVE-2008-293118
-rw-r--r--retired/CVE-2008-307718
3 files changed, 59 insertions, 0 deletions
diff --git a/retired/CVE-2008-2358 b/retired/CVE-2008-2358
new file mode 100644
index 00000000..298970a2
--- /dev/null
+++ b/retired/CVE-2008-2358
@@ -0,0 +1,23 @@
+Candidate: CVE-2008-2358
+Description:
+ The Datagram Congestion Control Protocol (DCCP) subsystem in the Linux
+ kernel 2.6.18, and probably other versions, does not properly check
+ feature lengths, which might allow remote attackers to execute arbitrary
+ code, related to an unspecified "overflow."
+References:
+Ubuntu-Description:
+Notes:
+ kees> linux-2.6: 19443178fbfbf40db15c86012fc37df1a44ab857
+ dannf> Only effects 2.6.17-2.6.19, between
+ dannf> afe00251dd9b53d51de91ff0099961f42bbf3754 and
+ dannf> c02fdc0e81e9c735d8d895af1e201b235df326d8
+Bugs:
+upstream: released (2.6.26)
+linux-2.6: released (2.6.26-1)
+2.6.18-etch-security: released (2.6.18.dfsg.1-18etch6) [bugfix/dccp-feature-length-check.patch]
+2.6.24-etch-security: N/A
+2.6.26-lenny-security: N/A
+2.6.15-dapper-security: N/A
+2.6.20-feisty-security: released (2.6.20-17.37)
+2.6.22-gutsy-security: released (2.6.22-15.56)
+2.6.24-hardy-security: released (2.6.24-19.36)
diff --git a/retired/CVE-2008-2931 b/retired/CVE-2008-2931
new file mode 100644
index 00000000..4c74abf7
--- /dev/null
+++ b/retired/CVE-2008-2931
@@ -0,0 +1,18 @@
+Candidate: CVE-2008-2931
+Description:
+References:
+ http://article.gmane.org/gmane.comp.security.oss.general/630
+ https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-2931
+Ubuntu-Description:
+Notes:
+Bugs:
+upstream: released (2.6.21)
+linux-2.6: N/A
+2.6.18-etch-security: released (2.6.18.dfsg.1-22etch1) [bugfix/check-privileges-before-setting-mount-propagation.patch]
+2.6.24-etch-security: N/A
+2.6.26-lenny-security: N/A
+2.6.15-dapper-security: released (2.6.15-52.71)
+2.6.20-feisty-security: released (2.6.20-17.39)
+2.6.22-gutsy-security: N/A
+2.6.24-hardy-security: N/A
+2.6.27-intrepid-security: N/A
diff --git a/retired/CVE-2008-3077 b/retired/CVE-2008-3077
new file mode 100644
index 00000000..ffb748b5
--- /dev/null
+++ b/retired/CVE-2008-3077
@@ -0,0 +1,18 @@
+Candidate: CVE-2008-3077
+Description:
+References:
+ http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=commitdiff;h=1e9a615bfce7996ea4d815d45d364b47ac6a74e8
+Ubuntu-Description:
+Notes:
+ dannf> 2.6.25-specific
+Bugs:
+upstream: released (2.6.25.10, 2.6.26)
+linux-2.6: N/A
+2.6.18-etch-security: N/A
+2.6.24-etch-security: N/A
+2.6.26-lenny-security: N/A
+2.6.15-dapper-security: N/A
+2.6.20-feisty-security: N/A
+2.6.22-gutsy-security: N/A
+2.6.24-hardy-security: N/A
+2.6.27-intrepid-security: N/A

© 2014-2024 Faster IT GmbH | imprint | privacy policy