From f3581ec9b2d48c6103c22fecb46f713217d834e8 Mon Sep 17 00:00:00 2001 From: dann frazier Date: Thu, 17 Aug 2006 00:24:25 +0000 Subject: move retired to the top level hierarchy so people can easily checkout just the active issues git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@548 e094ebfe-e918-0410-adfb-c712417f3574 --- retired/CVE-2006-0457 | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 retired/CVE-2006-0457 (limited to 'retired/CVE-2006-0457') diff --git a/retired/CVE-2006-0457 b/retired/CVE-2006-0457 new file mode 100644 index 00000000..e413d34e --- /dev/null +++ b/retired/CVE-2006-0457 @@ -0,0 +1,31 @@ +Candidate: CVE-2006-0457 +References: + http://linux.bkbits.net:8080/linux-2.6/cset@43e385c7rMAIqryXIl7lGGdWgZ1Ivg + MANDRIVA:MDKSA-2006:059 + URL:http://frontal2.mandriva.com/security/advisories?name=MDKSA-2006:059 + UBUNTU:USN-263-1 + URL:http://www.ubuntulinux.org/support/documentation/usn/usn-263-1 + BID:17084 + URL:http://www.securityfocus.com/bid/17084 + OSVDB:23894 + URL:http://www.osvdb.org/23894 + SECUNIA:19220 + URL:http://secunia.com/advisories/19220 +Description: + Race condition in the (1) add_key, (2) request_key, and (3) keyctl functions + in Linux kernel 2.6.x allows local users to cause a denial of service (crash) + or read sensitive kernel memory by modifying the length of a string argument + between the time that the kernel calculates the length and when it copies the + data into kernel memory. +Notes: +Bugs: +upstream: released (2.6.10) +linux-2.6: released (2.6.10-1) +2.6.8-sarge-security: N/A +2.4.27-sarge-security: N/A +2.4.19-woody-security: N/A +2.4.18-woody-security: N/A +2.4.17-woody-security: N/A +2.4.16-woody-security: N/A +2.4.17-woody-security-hppa: N/A +2.4.17-woody-security-ia64: N/A -- cgit v1.2.3