[kernel] r5756 - patch-tracking/dsa-texts
Moritz Muehlenhoff
jmm-guest at costa.debian.org
Wed Feb 8 15:24:02 UTC 2006
Author: jmm-guest
Date: Wed Feb 8 15:24:00 2006
New Revision: 5756
Modified:
patch-tracking/dsa-texts/2.6.8-sarge2
Log:
more work on the DSA text for 2.6.8
Modified: patch-tracking/dsa-texts/2.6.8-sarge2
==============================================================================
--- patch-tracking/dsa-texts/2.6.8-sarge2 (original)
+++ patch-tracking/dsa-texts/2.6.8-sarge2 Wed Feb 8 15:24:00 2006
@@ -8,16 +8,17 @@
Package : kernel-source-2.6.8
Vulnerability : several
-Problem-Type : local/remote XXX
+Problem-Type : local/remote
Debian-specific: no
-CVE ID :
-Debian Bug :
+CVE ID : CVE-2004-1017 CVE-2005-0124 CVE-2005-0449 CVE-2005-2457 CVE-2005-2490 CVE-2005-2555 CVE-2005-2709 CVE-2005-2800 CVE-2005-2973 CVE-2005-3044 CVE-2005-3053 CVE-2005-3055 CVE-2005-3180 CVE-2005-3181 CVE-2005-3257 CVE-2005-3356 CVE-2005-3358 CVE-2005-3783 CVE-2005-3784 CVE-2005-3806 CVE-2005-3847 CVE-2005-3848 CVE-2005-3857 CVE-2005-3858 CVE-2005-4605 CVE-2005-4618 CVE-2006-0095 CVE-2006-0096 CVE-2006-0482
+Debian Bug : 334113 330287 332587 330343 330353 327416
Several local and remote vulnerabilities have been discovered in the Linux
kernel that may lead to a denial of service or the execution of arbitrary
code. The Common Vulnerabilities and Exposures project identifies the
following problems:
+
CVE-2004-1017
Multiple overflows exist in the io_edgeport driver which might be usable
@@ -103,6 +104,10 @@
Rudolf Polzer discovered that the kernel improperly restricts access to the
KDSKBSENT ioctl, which can possibly lead to privilege escalation.
+CVE-2005-3356
+
+ foo
+
CVE-2005-3358
Doug Chapman discovered that passing a 0 zero bitmask to the set_mempolicy()
@@ -150,6 +155,10 @@
foo
+CVE-2005-4618
+
+ foo
+
CVE-2006-0095
foo
@@ -158,7 +167,17 @@
foo
+CVE-2006-0482
+ foo
+
+ia64-buggy-preempt
+
+ foo
+
+lost-sockfd
+
+ foo
More information about the Kernel-svn-changes
mailing list