summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2005-0177
blob: c87b59549929c1b27a907bcce512f8b41ff0cd3b (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
Candidate: CVE-2005-0177
References: 
 CONFIRM:http://linux.bkbits.net:8080/linux-2.6/cset@41e2bfbeOiXFga62XrBhzm7Kv9QDmQ
 CONECTIVA:CLA-2005:930
 URL:http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930
 REDHAT:RHSA-2005:092
 URL:http://www.redhat.com/support/errata/RHSA-2005-092.html
 BUGTRAQ:20050215 [USN-82-1] Linux kernel vulnerabilities
 URL:http://marc.theaimsgroup.com/?l=full-disclosure&m=110846102231365&w=2
Description: 
 nls_ascii.c in Linux before 2.6.8.1 uses an incorrect table size, which allows
 attackers to cause a denial of service (kernel crash) via a buffer overflow.
Notes: 
 dannf> nls_ascii.c isn't in <= 2.4.27
Bugs: 
upstream: released (2.6.8.1, 2.6.11)
linux-2.6: N/A
2.6.8-sarge-security: released (2.6.8-14) [nls-table-overflow.dpatch]
2.4.27-sarge-security: N/A
2.4.19-woody-security: N/A
2.4.18-woody-security: N/A
2.4.17-woody-security: N/A
2.4.16-woody-security: N/A
2.4.17-woody-security-hppa: N/A
2.4.17-woody-security-ia64: N/A
2.4.18-woody-security-hppa: N/A

© 2014-2024 Faster IT GmbH | imprint | privacy policy