From f3581ec9b2d48c6103c22fecb46f713217d834e8 Mon Sep 17 00:00:00 2001 From: dann frazier Date: Thu, 17 Aug 2006 00:24:25 +0000 Subject: move retired to the top level hierarchy so people can easily checkout just the active issues git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@548 e094ebfe-e918-0410-adfb-c712417f3574 --- retired/CVE-2005-2800 | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 retired/CVE-2005-2800 (limited to 'retired/CVE-2005-2800') diff --git a/retired/CVE-2005-2800 b/retired/CVE-2005-2800 new file mode 100644 index 000000000..6174e4950 --- /dev/null +++ b/retired/CVE-2005-2800 @@ -0,0 +1,24 @@ +Candidate: CVE-2005-2800 +References: + URL:http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=CVE-2005-2800 +Description: + Memory leak in the seq_file implemenetation in the SCSI procfs interface + (sg.c) in Linux kernel 2.6.13 and earlier allows local users to cause a + denial of service (memory consumption) via certain repeated reads from the + /proc/scsi/sg/devices file, which is not properly handled when the next() + iterator returns NULL or an error. +Notes: + dannf> seq_file is a 2.6ism, so marking 2.4 as N/A + dannf> There's a trivial test case - can it be reproduce this on 2.4? +Bugs: +upstream: released (2.6.12.6) +linux-2.6: released (2.6.12-6) +2.6.8-sarge-security: released (2.6.8-16sarge2) +2.4.27-sarge-security: N/A +2.4.19-woody-security: N/A +2.4.18-woody-security: N/A +2.4.17-woody-security: N/A +2.4.16-woody-security: N/A +2.4.17-woody-security-hppa: N/A +2.4.17-woody-security-ia64: N/A +2.4.18-woody-security-hppa: N/A -- cgit v1.2.3