[kernel] r6577 - patch-tracking
Dann Frazier
dannf at costa.debian.org
Tue May 16 07:31:05 UTC 2006
Author: dannf
Date: Tue May 16 07:30:59 2006
New Revision: 6577
Modified:
patch-tracking/CVE-2006-0457
Log:
vulnerable code isn't in sarge
Modified: patch-tracking/CVE-2006-0457
==============================================================================
--- patch-tracking/CVE-2006-0457 (original)
+++ patch-tracking/CVE-2006-0457 Tue May 16 07:30:59 2006
@@ -1,17 +1,32 @@
Candidate: CVE-2006-0457
References:
http://linux.bkbits.net:8080/linux-2.6/cset@43e385c7rMAIqryXIl7lGGdWgZ1Ivg
+ MANDRIVA:MDKSA-2006:059
+ URL:http://frontal2.mandriva.com/security/advisories?name=MDKSA-2006:059
+ UBUNTU:USN-263-1
+ URL:http://www.ubuntulinux.org/support/documentation/usn/usn-263-1
+ BID:17084
+ URL:http://www.securityfocus.com/bid/17084
+ OSVDB:23894
+ URL:http://www.osvdb.org/23894
+ SECUNIA:19220
+ URL:http://secunia.com/advisories/19220
Description:
+ Race condition in the (1) add_key, (2) request_key, and (3) keyctl functions
+ in Linux kernel 2.6.x allows local users to cause a denial of service (crash)
+ or read sensitive kernel memory by modifying the length of a string argument
+ between the time that the kernel calculates the length and when it copies the
+ data into kernel memory.
Notes:
Bugs:
-upstream:
-linux-2.6:
-2.6.8-sarge-security:
-2.4.27-sarge-security:
-2.4.27:
-2.4.19-woody-security:
-2.4.18-woody-security:
-2.4.17-woody-security:
-2.4.16-woody-security:
-2.4.17-woody-security-hppa:
-2.4.17-woody-security-ia64:
+upstream: released (2.6.10)
+linux-2.6: released (2.6.10-1)
+2.6.8-sarge-security: N/A
+2.4.27-sarge-security: N/A
+2.4.27: N/A
+2.4.19-woody-security: N/A
+2.4.18-woody-security: N/A
+2.4.17-woody-security: N/A
+2.4.16-woody-security: N/A
+2.4.17-woody-security-hppa: N/A
+2.4.17-woody-security-ia64: N/A
More information about the Kernel-svn-changes
mailing list