From f3581ec9b2d48c6103c22fecb46f713217d834e8 Mon Sep 17 00:00:00 2001 From: dann frazier Date: Thu, 17 Aug 2006 00:24:25 +0000 Subject: move retired to the top level hierarchy so people can easily checkout just the active issues git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@548 e094ebfe-e918-0410-adfb-c712417f3574 --- retired/CVE-2005-1768 | 34 ++++++++++++++++++++++++++++++++++ 1 file changed, 34 insertions(+) create mode 100644 retired/CVE-2005-1768 (limited to 'retired/CVE-2005-1768') diff --git a/retired/CVE-2005-1768 b/retired/CVE-2005-1768 new file mode 100644 index 00000000..00eb2833 --- /dev/null +++ b/retired/CVE-2005-1768 @@ -0,0 +1,34 @@ +Candidate: CVE-2005-1768 +References: + URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1768 + Final-Decision: + Interim-Decision: + Modified: + Proposed: + Assigned: 20050531 + Category: SF + BUGTRAQ:20050711 [ Suresec Advisories ] - Linux kernel ia32 compatibility (ia64/x86-64) + URL:http://marc.theaimsgroup.com/?l=bugtraq&m=112110120216116&w=2 + MISC:http://www.suresec.org/advisories/adv4.pdf +Description: + Race condition in the ia32 compatibility code for the execve system + call in Linux kernel 2.4 before 2.4.31 and 2.6 before 2.6.6 allows + local users to cause a denial of service (kernel panic) and possibly + execute arbitrary code via a concurrent thread that increments a + pointer count after the nargs function has counted the pointers, but + before the count is copied from user space to kernel space, which + leads to a buffer overflow. +Notes: + 167_arch-ia64-x86_64_execve.diff (note 2.4 is not supported for amd64) +upstream: released (2.4.31, 2.6.6) +2.6.8-sarge-security: N/A +2.4.27-sid/sarge: released (2.4.27-11) +2.4.27-sarge-security: released (2.4.27-10sarge1) +linux-2.6: N/A +2.4.19-woody-security: +2.4.18-woody-security: +2.4.17-woody-security: +2.4.16-woody-security: +2.4.17-woody-security-hppa: +2.4.17-woody-security-ia64: +2.4.18-woody-security-hppa: -- cgit v1.2.3