summaryrefslogtreecommitdiffstats
path: root/website/DTSA/DTSA-16-1.html
diff options
context:
space:
mode:
authorJoey Hess <joeyh@debian.org>2005-10-19 22:57:32 +0000
committerJoey Hess <joeyh@debian.org>2005-10-19 22:57:32 +0000
commit7f80adf6e6c3a24596af73c5ac1e03fa4c9d2129 (patch)
tree1fcc64ad61167eff165d0351640f02bac28e3cdf /website/DTSA/DTSA-16-1.html
parenta3151f8075f7c8d4570fe04acbbff2810878636e (diff)
update website to use only CVE references
git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@2459 e39458fd-73e7-0310-bf30-c45bca0a0e42
Diffstat (limited to 'website/DTSA/DTSA-16-1.html')
-rw-r--r--website/DTSA/DTSA-16-1.html60
1 files changed, 30 insertions, 30 deletions
diff --git a/website/DTSA/DTSA-16-1.html b/website/DTSA/DTSA-16-1.html
index 103420c21b..0e2726b487 100644
--- a/website/DTSA/DTSA-16-1.html
+++ b/website/DTSA/DTSA-16-1.html
@@ -50,57 +50,57 @@
<dd>No<br></dd>
<dt>CVE:</dt>
<dd>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2098'>CAN-2005-2098</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2099'>CAN-2005-2099</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2456'>CAN-2005-2456</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2617'>CAN-2005-2617</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1913'>CAN-2005-1913</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1761'>CAN-2005-1761</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2457'>CAN-2005-2457</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2458'>CAN-2005-2458</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2459'>CAN-2005-2459</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2548'>CAN-2005-2548</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-2302'>CAN-2004-2302</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1765'>CAN-2005-1765</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1762'>CAN-2005-1762</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1761'>CAN-2005-1761</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2555'>CAN-2005-2555</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2098'>CVE-2005-2098</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2099'>CVE-2005-2099</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2456'>CVE-2005-2456</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2617'>CVE-2005-2617</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1913'>CVE-2005-1913</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1761'>CVE-2005-1761</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2457'>CVE-2005-2457</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2458'>CVE-2005-2458</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2459'>CVE-2005-2459</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2548'>CVE-2005-2548</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2302'>CVE-2004-2302</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1765'>CVE-2005-1765</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1762'>CVE-2005-1762</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1761'>CVE-2005-1761</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2555'>CVE-2005-2555</a>
<br></dd>
<br><dt>More information:</dt>
<dd>Several security related problems have been found in version 2.6 of the&nbsp;<br>
linux kernel. The Common Vulnerabilities and Exposures project identifies&nbsp;<br>
the following problems:&nbsp;<br>
&nbsp;<br>
-CAN-2004-2302&nbsp;<br>
+CVE-2004-2302&nbsp;<br>
&nbsp;<br>
Race condition in the sysfs_read_file and sysfs_write_file functions in&nbsp;<br>
Linux kernel before 2.6.10 allows local users to read kernel memory and&nbsp;<br>
cause a denial of service (crash) via large offsets in sysfs files.&nbsp;<br>
&nbsp;<br>
-CAN-2005-1761&nbsp;<br>
+CVE-2005-1761&nbsp;<br>
&nbsp;<br>
Vulnerability in the Linux kernel allows local users to cause a&nbsp;<br>
denial of service (kernel crash) via ptrace.&nbsp;<br>
&nbsp;<br>
-CAN-2005-1762&nbsp;<br>
+CVE-2005-1762&nbsp;<br>
&nbsp;<br>
The ptrace call in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64&nbsp;<br>
platform allows local users to cause a denial of service (kernel crash) via&nbsp;<br>
a "non-canonical" address.&nbsp;<br>
&nbsp;<br>
-CAN-2005-1765&nbsp;<br>
+CVE-2005-1765&nbsp;<br>
&nbsp;<br>
syscall in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform, when&nbsp;<br>
running in 32-bit compatibility mode, allows local users to cause a denial&nbsp;<br>
of service (kernel hang) via crafted arguments.&nbsp;<br>
&nbsp;<br>
-CAN-2005-1913&nbsp;<br>
+CVE-2005-1913&nbsp;<br>
&nbsp;<br>
When a non group-leader thread called exec() to execute a different program&nbsp;<br>
while an itimer was pending, the timer expiry would signal the old group&nbsp;<br>
leader task, which did not exist any more. This caused a kernel panic.&nbsp;<br>
&nbsp;<br>
-CAN-2005-2098 &nbsp;<br>
+CVE-2005-2098 &nbsp;<br>
&nbsp;<br>
The KEYCTL_JOIN_SESSION_KEYRING operation in the Linux kernel before&nbsp;<br>
2.6.12.5 contains an error path that does not properly release the session&nbsp;<br>
@@ -109,7 +109,7 @@ CAN-2005-2098 &nbsp;<br>
empty name string, (2) with a long name string, (3) with the key quota&nbsp;<br>
reached, or (4) ENOMEM.&nbsp;<br>
&nbsp;<br>
-CAN-2005-2099&nbsp;<br>
+CVE-2005-2099&nbsp;<br>
&nbsp;<br>
The Linux kernel before 2.6.12.5 does not properly destroy a keyring that&nbsp;<br>
is not instantiated properly, which allows local users or remote attackers&nbsp;<br>
@@ -117,7 +117,7 @@ CAN-2005-2099&nbsp;<br>
that is not empty, which causes the creation to fail, leading to a null&nbsp;<br>
dereference in the keyring destructor.&nbsp;<br>
&nbsp;<br>
-CAN-2005-2456&nbsp;<br>
+CVE-2005-2456&nbsp;<br>
&nbsp;<br>
Array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c&nbsp;<br>
in Linux kernel 2.6 allows local users to cause a denial of service (oops&nbsp;<br>
@@ -125,41 +125,41 @@ CAN-2005-2456&nbsp;<br>
larger than XFRM_POLICY_OUT, which is used as an index in the&nbsp;<br>
sock->sk_policy array.&nbsp;<br>
&nbsp;<br>
-CAN-2005-2457&nbsp;<br>
+CVE-2005-2457&nbsp;<br>
&nbsp;<br>
The driver for compressed ISO file systems (zisofs) in the Linux kernel&nbsp;<br>
before 2.6.12.5 allows local users and remote attackers to cause a denial&nbsp;<br>
of service (kernel crash) via a crafted compressed ISO file system.&nbsp;<br>
&nbsp;<br>
-CAN-2005-2458&nbsp;<br>
+CVE-2005-2458&nbsp;<br>
&nbsp;<br>
inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 allows&nbsp;<br>
remote attackers to cause a denial of service (kernel crash) via a&nbsp;<br>
compressed file with "improper tables".&nbsp;<br>
&nbsp;<br>
-CAN-2005-2459&nbsp;<br>
+CVE-2005-2459&nbsp;<br>
&nbsp;<br>
The huft_build function in inflate.c in the zlib routines in the Linux&nbsp;<br>
kernel before 2.6.12.5 returns the wrong value, which allows remote&nbsp;<br>
attackers to cause a denial of service (kernel crash) via a certain&nbsp;<br>
compressed file that leads to a null pointer dereference, a different&nbsp;<br>
- vulnerbility than CAN-2005-2458.&nbsp;<br>
+ vulnerbility than CVE-2005-2458.&nbsp;<br>
&nbsp;<br>
-CAN-2005-2548&nbsp;<br>
+CVE-2005-2548&nbsp;<br>
&nbsp;<br>
vlan_dev.c in Linux kernel 2.6.8 allows remote attackers to cause a denial&nbsp;<br>
of service (kernel oops from null dereference) via certain UDP packets that&nbsp;<br>
lead to a function call with the wrong argument, as demonstrated using&nbsp;<br>
snmpwalk on snmpd.&nbsp;<br>
&nbsp;<br>
-CAN-2005-2555&nbsp;<br>
+CVE-2005-2555&nbsp;<br>
&nbsp;<br>
Linux kernel 2.6.x does not properly restrict socket policy access to users&nbsp;<br>
with the CAP_NET_ADMIN capability, which could allow local users to conduct&nbsp;<br>
unauthorized activities via (1) ipv4/ip_sockglue.c and (2)&nbsp;<br>
ipv6/ipv6_sockglue.c.&nbsp;<br>
&nbsp;<br>
-CAN-2005-2617&nbsp;<br>
+CVE-2005-2617&nbsp;<br>
&nbsp;<br>
The syscall32_setup_pages function in syscall32.c for Linux kernel 2.6.12&nbsp;<br>
and later, on the amd64 architecture, does not check the return value of&nbsp;<br>

© 2014-2024 Faster IT GmbH | imprint | privacy policy