From f3581ec9b2d48c6103c22fecb46f713217d834e8 Mon Sep 17 00:00:00 2001 From: dann frazier Date: Thu, 17 Aug 2006 00:24:25 +0000 Subject: move retired to the top level hierarchy so people can easily checkout just the active issues git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@548 e094ebfe-e918-0410-adfb-c712417f3574 --- retired/CVE-2005-1767 | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 retired/CVE-2005-1767 (limited to 'retired/CVE-2005-1767') diff --git a/retired/CVE-2005-1767 b/retired/CVE-2005-1767 new file mode 100644 index 00000000..e1cbe995 --- /dev/null +++ b/retired/CVE-2005-1767 @@ -0,0 +1,23 @@ +Candidate: CVE-2005-1767 +References: + CONFIRM:http://kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git;a=commit;h=51e31546a2fc46cb978da2ee0330a6a68f07541e + http://www.novell.com/linux/security/advisories/2005_44_kernel.html + http://www.ubuntu.com/usn/usn-187-1 +Description: + traps.c in the Linux kernel 2.6.x and 2.4.x executes stack segment faults on an exception + stack, which allows local users to cause a denial of service (oops and stack fault exception). +Notes: + This is already fixed in 2.6 and added for completeness. + Horms> This is amd64 specific, and thus should not affect 2.4 +Bugs: +upstream: released (2.6.12, 2.4.32) +linux-2.6: N/A +2.6.8-sarge-security: released (2.6.8-16sarge1) [arch-x86_64-kernel-stack-faults.dpatch, arch-x86_64-nmi.dpatch, arch-x86_64-kernel-stack-faults.dpatch] +2.4.27-sarge-security: released (2.4.27-10sarge1) [181_arch-x86_64-kernel-stack-faults.diff] +2.4.19-woody-security: N/A +2.4.18-woody-security: N/A +2.4.17-woody-security: N/A +2.4.16-woody-security: N/A +2.4.17-woody-security-hppa: N/A +2.4.17-woody-security-ia64: N/A +2.4.18-woody-security-hppa: N/A -- cgit v1.2.3