diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2009-05-19 08:52:02 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2009-05-19 08:52:02 +0000 |
commit | 99f97575a67307917c6cb4b9c33617e6a556c938 (patch) | |
tree | 6a949adfe2144e1dfe9e351aa37de155002d5ca0 /retired | |
parent | 6d4c0a545277fc983a1f4002d6b5bec5a87abb33 (diff) |
retire issues
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1379 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired')
-rw-r--r-- | retired/CVE-2008-2358 | 23 | ||||
-rw-r--r-- | retired/CVE-2008-2931 | 18 | ||||
-rw-r--r-- | retired/CVE-2008-3077 | 18 |
3 files changed, 59 insertions, 0 deletions
diff --git a/retired/CVE-2008-2358 b/retired/CVE-2008-2358 new file mode 100644 index 00000000..298970a2 --- /dev/null +++ b/retired/CVE-2008-2358 @@ -0,0 +1,23 @@ +Candidate: CVE-2008-2358 +Description: + The Datagram Congestion Control Protocol (DCCP) subsystem in the Linux + kernel 2.6.18, and probably other versions, does not properly check + feature lengths, which might allow remote attackers to execute arbitrary + code, related to an unspecified "overflow." +References: +Ubuntu-Description: +Notes: + kees> linux-2.6: 19443178fbfbf40db15c86012fc37df1a44ab857 + dannf> Only effects 2.6.17-2.6.19, between + dannf> afe00251dd9b53d51de91ff0099961f42bbf3754 and + dannf> c02fdc0e81e9c735d8d895af1e201b235df326d8 +Bugs: +upstream: released (2.6.26) +linux-2.6: released (2.6.26-1) +2.6.18-etch-security: released (2.6.18.dfsg.1-18etch6) [bugfix/dccp-feature-length-check.patch] +2.6.24-etch-security: N/A +2.6.26-lenny-security: N/A +2.6.15-dapper-security: N/A +2.6.20-feisty-security: released (2.6.20-17.37) +2.6.22-gutsy-security: released (2.6.22-15.56) +2.6.24-hardy-security: released (2.6.24-19.36) diff --git a/retired/CVE-2008-2931 b/retired/CVE-2008-2931 new file mode 100644 index 00000000..4c74abf7 --- /dev/null +++ b/retired/CVE-2008-2931 @@ -0,0 +1,18 @@ +Candidate: CVE-2008-2931 +Description: +References: + http://article.gmane.org/gmane.comp.security.oss.general/630 + https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-2931 +Ubuntu-Description: +Notes: +Bugs: +upstream: released (2.6.21) +linux-2.6: N/A +2.6.18-etch-security: released (2.6.18.dfsg.1-22etch1) [bugfix/check-privileges-before-setting-mount-propagation.patch] +2.6.24-etch-security: N/A +2.6.26-lenny-security: N/A +2.6.15-dapper-security: released (2.6.15-52.71) +2.6.20-feisty-security: released (2.6.20-17.39) +2.6.22-gutsy-security: N/A +2.6.24-hardy-security: N/A +2.6.27-intrepid-security: N/A diff --git a/retired/CVE-2008-3077 b/retired/CVE-2008-3077 new file mode 100644 index 00000000..ffb748b5 --- /dev/null +++ b/retired/CVE-2008-3077 @@ -0,0 +1,18 @@ +Candidate: CVE-2008-3077 +Description: +References: + http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=commitdiff;h=1e9a615bfce7996ea4d815d45d364b47ac6a74e8 +Ubuntu-Description: +Notes: + dannf> 2.6.25-specific +Bugs: +upstream: released (2.6.25.10, 2.6.26) +linux-2.6: N/A +2.6.18-etch-security: N/A +2.6.24-etch-security: N/A +2.6.26-lenny-security: N/A +2.6.15-dapper-security: N/A +2.6.20-feisty-security: N/A +2.6.22-gutsy-security: N/A +2.6.24-hardy-security: N/A +2.6.27-intrepid-security: N/A |