diff options
author | Joey Hess <joeyh@debian.org> | 2005-10-19 22:57:32 +0000 |
---|---|---|
committer | Joey Hess <joeyh@debian.org> | 2005-10-19 22:57:32 +0000 |
commit | 7f80adf6e6c3a24596af73c5ac1e03fa4c9d2129 (patch) | |
tree | 1fcc64ad61167eff165d0351640f02bac28e3cdf /website/DTSA/DTSA-16-1.html | |
parent | a3151f8075f7c8d4570fe04acbbff2810878636e (diff) |
update website to use only CVE references
git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@2459 e39458fd-73e7-0310-bf30-c45bca0a0e42
Diffstat (limited to 'website/DTSA/DTSA-16-1.html')
-rw-r--r-- | website/DTSA/DTSA-16-1.html | 60 |
1 files changed, 30 insertions, 30 deletions
diff --git a/website/DTSA/DTSA-16-1.html b/website/DTSA/DTSA-16-1.html index 103420c21b..0e2726b487 100644 --- a/website/DTSA/DTSA-16-1.html +++ b/website/DTSA/DTSA-16-1.html @@ -50,57 +50,57 @@ <dd>No<br></dd> <dt>CVE:</dt> <dd> -<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2098'>CAN-2005-2098</a> -<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2099'>CAN-2005-2099</a> -<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2456'>CAN-2005-2456</a> -<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2617'>CAN-2005-2617</a> -<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1913'>CAN-2005-1913</a> -<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1761'>CAN-2005-1761</a> -<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2457'>CAN-2005-2457</a> -<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2458'>CAN-2005-2458</a> -<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2459'>CAN-2005-2459</a> -<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2548'>CAN-2005-2548</a> -<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-2302'>CAN-2004-2302</a> -<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1765'>CAN-2005-1765</a> -<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1762'>CAN-2005-1762</a> -<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1761'>CAN-2005-1761</a> -<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2555'>CAN-2005-2555</a> +<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2098'>CVE-2005-2098</a> +<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2099'>CVE-2005-2099</a> +<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2456'>CVE-2005-2456</a> +<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2617'>CVE-2005-2617</a> +<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1913'>CVE-2005-1913</a> +<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1761'>CVE-2005-1761</a> +<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2457'>CVE-2005-2457</a> +<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2458'>CVE-2005-2458</a> +<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2459'>CVE-2005-2459</a> +<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2548'>CVE-2005-2548</a> +<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2302'>CVE-2004-2302</a> +<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1765'>CVE-2005-1765</a> +<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1762'>CVE-2005-1762</a> +<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1761'>CVE-2005-1761</a> +<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2555'>CVE-2005-2555</a> <br></dd> <br><dt>More information:</dt> <dd>Several security related problems have been found in version 2.6 of the <br> linux kernel. The Common Vulnerabilities and Exposures project identifies <br> the following problems: <br> <br> -CAN-2004-2302 <br> +CVE-2004-2302 <br> <br> Race condition in the sysfs_read_file and sysfs_write_file functions in <br> Linux kernel before 2.6.10 allows local users to read kernel memory and <br> cause a denial of service (crash) via large offsets in sysfs files. <br> <br> -CAN-2005-1761 <br> +CVE-2005-1761 <br> <br> Vulnerability in the Linux kernel allows local users to cause a <br> denial of service (kernel crash) via ptrace. <br> <br> -CAN-2005-1762 <br> +CVE-2005-1762 <br> <br> The ptrace call in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 <br> platform allows local users to cause a denial of service (kernel crash) via <br> a "non-canonical" address. <br> <br> -CAN-2005-1765 <br> +CVE-2005-1765 <br> <br> syscall in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform, when <br> running in 32-bit compatibility mode, allows local users to cause a denial <br> of service (kernel hang) via crafted arguments. <br> <br> -CAN-2005-1913 <br> +CVE-2005-1913 <br> <br> When a non group-leader thread called exec() to execute a different program <br> while an itimer was pending, the timer expiry would signal the old group <br> leader task, which did not exist any more. This caused a kernel panic. <br> <br> -CAN-2005-2098 <br> +CVE-2005-2098 <br> <br> The KEYCTL_JOIN_SESSION_KEYRING operation in the Linux kernel before <br> 2.6.12.5 contains an error path that does not properly release the session <br> @@ -109,7 +109,7 @@ CAN-2005-2098 <br> empty name string, (2) with a long name string, (3) with the key quota <br> reached, or (4) ENOMEM. <br> <br> -CAN-2005-2099 <br> +CVE-2005-2099 <br> <br> The Linux kernel before 2.6.12.5 does not properly destroy a keyring that <br> is not instantiated properly, which allows local users or remote attackers <br> @@ -117,7 +117,7 @@ CAN-2005-2099 <br> that is not empty, which causes the creation to fail, leading to a null <br> dereference in the keyring destructor. <br> <br> -CAN-2005-2456 <br> +CVE-2005-2456 <br> <br> Array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c <br> in Linux kernel 2.6 allows local users to cause a denial of service (oops <br> @@ -125,41 +125,41 @@ CAN-2005-2456 <br> larger than XFRM_POLICY_OUT, which is used as an index in the <br> sock->sk_policy array. <br> <br> -CAN-2005-2457 <br> +CVE-2005-2457 <br> <br> The driver for compressed ISO file systems (zisofs) in the Linux kernel <br> before 2.6.12.5 allows local users and remote attackers to cause a denial <br> of service (kernel crash) via a crafted compressed ISO file system. <br> <br> -CAN-2005-2458 <br> +CVE-2005-2458 <br> <br> inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 allows <br> remote attackers to cause a denial of service (kernel crash) via a <br> compressed file with "improper tables". <br> <br> -CAN-2005-2459 <br> +CVE-2005-2459 <br> <br> The huft_build function in inflate.c in the zlib routines in the Linux <br> kernel before 2.6.12.5 returns the wrong value, which allows remote <br> attackers to cause a denial of service (kernel crash) via a certain <br> compressed file that leads to a null pointer dereference, a different <br> - vulnerbility than CAN-2005-2458. <br> + vulnerbility than CVE-2005-2458. <br> <br> -CAN-2005-2548 <br> +CVE-2005-2548 <br> <br> vlan_dev.c in Linux kernel 2.6.8 allows remote attackers to cause a denial <br> of service (kernel oops from null dereference) via certain UDP packets that <br> lead to a function call with the wrong argument, as demonstrated using <br> snmpwalk on snmpd. <br> <br> -CAN-2005-2555 <br> +CVE-2005-2555 <br> <br> Linux kernel 2.6.x does not properly restrict socket policy access to users <br> with the CAP_NET_ADMIN capability, which could allow local users to conduct <br> unauthorized activities via (1) ipv4/ip_sockglue.c and (2) <br> ipv6/ipv6_sockglue.c. <br> <br> -CAN-2005-2617 <br> +CVE-2005-2617 <br> <br> The syscall32_setup_pages function in syscall32.c for Linux kernel 2.6.12 <br> and later, on the amd64 architecture, does not check the return value of <br> |