Candidate: CVE-2003-0248 References: REDHAT:RHSA-2003:187 URL:http://www.redhat.com/support/errata/RHSA-2003-187.html REDHAT:RHSA-2003:195 URL:http://www.redhat.com/support/errata/RHSA-2003-195.html DEBIAN:DSA-311 URL:http://www.debian.org/security/2003/dsa-311 DEBIAN:DSA-312 URL:http://www.debian.org/security/2003/dsa-312 DEBIAN:DSA-332 URL:http://www.debian.org/security/2003/dsa-332 DEBIAN:DSA-336 URL:http://www.debian.org/security/2003/dsa-336 DEBIAN:DSA-442 URL:http://www.debian.org/security/2004/dsa-442 MANDRAKE:MDKSA-2003:066 URL:http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:066 MANDRAKE:MDKSA-2003:074 URL:http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:074 TURBO:TLSA-2003-41 URL:http://www.turbolinux.com/security/TLSA-2003-41.txt OVAL:OVAL292 URL:http://oval.mitre.org/oval/definitions/data/oval292.html Description: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. Notes: dannf> I think this is the patch: dannf> http://linux.bkbits.net:8080/linux-2.4/cset@3f293760h0HL1XxaPHNYxPXmpO1k8g?nav=index.html|src/|src/arch|src/arch/i386|src/arch/i386/kernel|related/arch/i386/kernel/i387.c Bugs: upstream: released (2.4.22-pre10) linux-2.6: N/A 2.6.8-sarge-security: N/A 2.4.27-sarge-security: N/A 2.4.19-woody-security: released (2.4.19-4.woody3) 2.4.18-woody-security: released (2.4.18-9) 2.4.17-woody-security: released (2.4.17-1woody1) 2.4.16-woody-security: released (2.4.16-1woody3) 2.4.17-woody-security-hppa: N/A 2.4.17-woody-security-ia64: released (011226.14.1) 2.4.18-woody-security-hppa: N/A