blob: c87b59549929c1b27a907bcce512f8b41ff0cd3b (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
|
Candidate: CVE-2005-0177
References:
CONFIRM:http://linux.bkbits.net:8080/linux-2.6/cset@41e2bfbeOiXFga62XrBhzm7Kv9QDmQ
CONECTIVA:CLA-2005:930
URL:http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930
REDHAT:RHSA-2005:092
URL:http://www.redhat.com/support/errata/RHSA-2005-092.html
BUGTRAQ:20050215 [USN-82-1] Linux kernel vulnerabilities
URL:http://marc.theaimsgroup.com/?l=full-disclosure&m=110846102231365&w=2
Description:
nls_ascii.c in Linux before 2.6.8.1 uses an incorrect table size, which allows
attackers to cause a denial of service (kernel crash) via a buffer overflow.
Notes:
dannf> nls_ascii.c isn't in <= 2.4.27
Bugs:
upstream: released (2.6.8.1, 2.6.11)
linux-2.6: N/A
2.6.8-sarge-security: released (2.6.8-14) [nls-table-overflow.dpatch]
2.4.27-sarge-security: N/A
2.4.19-woody-security: N/A
2.4.18-woody-security: N/A
2.4.17-woody-security: N/A
2.4.16-woody-security: N/A
2.4.17-woody-security-hppa: N/A
2.4.17-woody-security-ia64: N/A
2.4.18-woody-security-hppa: N/A
|