[kernel] r5756 - patch-tracking/dsa-texts

Moritz Muehlenhoff jmm-guest at costa.debian.org
Wed Feb 8 15:24:02 UTC 2006


Author: jmm-guest
Date: Wed Feb  8 15:24:00 2006
New Revision: 5756

Modified:
   patch-tracking/dsa-texts/2.6.8-sarge2
Log:
more work on the DSA text for 2.6.8


Modified: patch-tracking/dsa-texts/2.6.8-sarge2
==============================================================================
--- patch-tracking/dsa-texts/2.6.8-sarge2	(original)
+++ patch-tracking/dsa-texts/2.6.8-sarge2	Wed Feb  8 15:24:00 2006
@@ -8,16 +8,17 @@
 
 Package        : kernel-source-2.6.8
 Vulnerability  : several
-Problem-Type   : local/remote XXX
+Problem-Type   : local/remote
 Debian-specific: no
-CVE ID         : 
-Debian Bug     : 
+CVE ID         : CVE-2004-1017 CVE-2005-0124 CVE-2005-0449 CVE-2005-2457 CVE-2005-2490 CVE-2005-2555 CVE-2005-2709 CVE-2005-2800 CVE-2005-2973 CVE-2005-3044 CVE-2005-3053 CVE-2005-3055 CVE-2005-3180 CVE-2005-3181 CVE-2005-3257 CVE-2005-3356 CVE-2005-3358 CVE-2005-3783 CVE-2005-3784 CVE-2005-3806 CVE-2005-3847 CVE-2005-3848 CVE-2005-3857 CVE-2005-3858 CVE-2005-4605 CVE-2005-4618 CVE-2006-0095 CVE-2006-0096 CVE-2006-0482
+Debian Bug     : 334113 330287 332587 330343 330353 327416
 
 Several local and remote vulnerabilities have been discovered in the Linux
 kernel that may lead to a denial of service or the execution of arbitrary
 code. The Common Vulnerabilities and Exposures project identifies the
 following problems:
 
+
 CVE-2004-1017
 
     Multiple overflows exist in the io_edgeport driver which might be usable
@@ -103,6 +104,10 @@
     Rudolf Polzer discovered that the kernel improperly restricts access to the
     KDSKBSENT ioctl, which can possibly lead to privilege escalation.
 
+CVE-2005-3356
+
+    foo
+
 CVE-2005-3358
 
     Doug Chapman discovered that passing a 0 zero bitmask to the set_mempolicy()
@@ -150,6 +155,10 @@
 
     foo
 
+CVE-2005-4618
+
+    foo
+
 CVE-2006-0095
 
     foo
@@ -158,7 +167,17 @@
 
     foo
 
+CVE-2006-0482
 
+    foo
+
+ia64-buggy-preempt
+
+    foo
+
+lost-sockfd
+
+    foo
 
 
 



More information about the Kernel-svn-changes mailing list