summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2008-5701
blob: e45789e703a4d09eda5b315f534d67c20c022271 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
Candidate: CVE-2008-5701
Description:
 Array index error in arch/mips/kernel/scall64-o32.S in the Linux kernel
 before 2.6.28-rc8 on 64-bit MIPS platforms allows local users to cause a
 denial of service (system crash) via an o32 syscall with a small syscall
 number, which leads to an attempted read operation outside the bounds of
 the syscall table.
References:
 http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git;a=commit;h=e807f9574e37a3f202e677feaaad1b7c5d2c0db8
 http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.28-rc8
Ubuntu-Description:
Notes:
Bugs:
upstream: released (2.6.28)
linux-2.6: released (2.6.26-13) [bugfix/mips/fix-potential-dos.patch]
2.6.18-etch-security: released (2.6.18.dfsg.1-24etch1) [bugfix/mips/fix-potential-dos.patch]
2.6.24-etch-security: released (2.6.24-6~etchnhalf.8etch1) [bugfix/mips/fix-potential-dos.patch]
2.6.26-lenny-security: released (2.6.26-13) [bugfix/mips/fix-potential-dos.patch]
2.6.15-dapper-security:
2.6.22-gutsy-security:
2.6.24-hardy-security:
2.6.27-intrepid-security:

© 2014-2024 Faster IT GmbH | imprint | privacy policy