Candidate: CVE-2005-1764 References: URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1764 Final-Decision: Interim-Decision: Modified: Proposed: Assigned: 20050531 Category: SF CONFIRM:http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=637716a3825e186555361574aa1fa3c0ebf8018b CONFIRM:http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=637716a3825e186555361574aa1fa3c0ebf8018bReference: SUSE:SUSE-SA:2005:029 URL:http://freshmeat.net/articles/view/1678/ Description: Linux 2.6.11 on 64-bit x86 (x86_64) platforms does not use a guard page for the 47-bit address page to protect against an AMD K8 bug, which allows local users to cause a denial of service. Notes: horms> I believe that only 2.6.11 is vulnerable to this upstream: released (2.6.11.11) 2.6.8-sarge-security: N/A 2.4.27-sid/sarge: N/A 2.4.27-sarge-security: N/A linux-2.6: N/A 2.4.19-woody-security: N/A 2.4.18-woody-security: N/A 2.4.17-woody-security: N/A 2.4.16-woody-security: N/A 2.4.17-woody-security-hppa: N/A 2.4.17-woody-security-ia64: N/A 2.4.18-woody-security-hppa: N/A