From f3581ec9b2d48c6103c22fecb46f713217d834e8 Mon Sep 17 00:00:00 2001 From: dann frazier Date: Thu, 17 Aug 2006 00:24:25 +0000 Subject: move retired to the top level hierarchy so people can easily checkout just the active issues git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@548 e094ebfe-e918-0410-adfb-c712417f3574 --- retired/CVE-2004-0619 | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 retired/CVE-2004-0619 (limited to 'retired/CVE-2004-0619') diff --git a/retired/CVE-2004-0619 b/retired/CVE-2004-0619 new file mode 100644 index 000000000..1cb869e36 --- /dev/null +++ b/retired/CVE-2004-0619 @@ -0,0 +1,28 @@ +Candidate: CVE-2004-0619 +References: + http://marc.theaimsgroup.com/?l=bugtraq&m=108802653409053&w=2 + http://www.redhat.com/support/errata/RHSA-2004-549.html + http://www.redhat.com/support/errata/RHSA-2005-283.html + http://www.ciac.org/ciac/bulletins/p-047.shtml + http://www.securityfocus.com/bid/10599 + http://secunia.com/advisories/11936 + http://xforce.iss.net/xforce/xfdb/16459 +Description: + Integer overflow in the ubsec_keysetup function for Linux Broadcom 5820 + cryptonet driver allows local users to cause a denial of service (crash) + and possibly execute arbitrary code via a negative add_dsa_buf_bytes + variable, which leads to a buffer overflow. +Notes: + jmm> I've checked 2.6.8, 2.4.27 and 2.6.14, this is not included in the + jmm> stock kernel, only in Red Hat's. I'm marking Woody N/A as well. +Bugs: +upstream: N/A +linux-2.6: N/A +2.6.8-sarge-security: N/A +2.4.27-sarge-security: N/A +2.4.19-woody-security: N/A +2.4.18-woody-security: N/A +2.4.17-woody-security: N/A +2.4.16-woody-security: N/A +2.4.17-woody-security-hppa: N/A +2.4.17-woody-security-ia64: N/A -- cgit v1.2.3