[kernel] r5012 - patch-tracking

Moritz Muehlenhoff jmm-guest at costa.debian.org
Wed Dec 14 21:06:20 UTC 2005


Author: jmm-guest
Date: Wed Dec 14 21:06:19 2005
New Revision: 5012

Added:
   patch-tracking/CVE-2005-2456
Log:
CVE-2005-2456


Added: patch-tracking/CVE-2005-2456
==============================================================================
--- (empty file)
+++ patch-tracking/CVE-2005-2456	Wed Dec 14 21:06:19 2005
@@ -0,0 +1,31 @@
+Candidate: CVE-2005-2456
+References: 
+ http://www.mail-archive.com/netdev@vger.kernel.org/msg00520.html
+ http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a4f1bac62564049ea4718c4624b0fadc9f597c84
+ http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=blobdiff;h=8da3e25b2c4c1f305fd85428d3a9eb62b543bfba;hp=ecade4893a139cc35d4fe345ce70242ede5358c4;hb=a4f1bac62564049ea4718c4624b0fadc9f597c84;f=net/xfrm/xfrm_user.c
+ http://frontal2.mandriva.com/security/advisories?name=MDKSA-2005:219
+ http://frontal2.mandriva.com/security/advisories?name=MDKSA-2005:220
+ http://www.ubuntulinux.org/support/documentation/usn/usn-169-1
+ http://www.novell.com/linux/security/advisories/2005_50_kernel.html
+ http://www.securityfocus.com/bid/14477
+ http://secunia.com/advisories/16298
+ http://secunia.com/advisories/16500
+ http://xforce.iss.net/xforce/xfdb/21710
+Description: 
+ Array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c
+ in Linux kernel 2.6 allows local users to cause a denial of service (oops
+ or deadlock) and possibly execute arbitrary code via a p->dir value that is
+ larger than XFRM_POLICY_OUT, which is used as an index in the sock->sk_policy
+ array.
+Notes: 
+Bugs: 321401
+upstream: 
+2.6.14: released (2.6.12-2)
+2.6.8-sarge-security: 
+2.4.27-sarge-security: released (2.4.27-10sarge1)
+2.4.19-woody-security: 
+2.4.18-woody-security: 
+2.4.17-woody-security: 
+2.4.16-woody-security: 
+2.4.17-woody-security-hppa: 
+2.4.17-woody-security-ia64: 



More information about the Kernel-svn-changes mailing list