[kernel] r4755 - people/dannf/patchinfo
Simon Horman
horms at costa.debian.org
Wed Nov 9 03:46:28 UTC 2005
Author: horms
Date: Wed Nov 9 03:46:26 2005
New Revision: 4755
Added:
people/dannf/patchinfo/cve-2005-2709-sysctl-unregistration-oops.patch
Log:
Added cve-2005-2709-sysctl-unregistration-oops.patch / CVE-2005-2709
Added: people/dannf/patchinfo/cve-2005-2709-sysctl-unregistration-oops.patch
==============================================================================
--- (empty file)
+++ people/dannf/patchinfo/cve-2005-2709-sysctl-unregistration-oops.patch Wed Nov 9 03:46:26 2005
@@ -0,0 +1,36 @@
+## A list of valid fields for patch description files, with examples
+Candidate: CVE-2005-2709
+References:
+ CONFIRM: http://www.kernel.org/git/?p=linux/kernel/git/chrisw/stable-queue.git;a=blob_plain;h=5dbbdc13a7bdbc132de44bc00e13079afaf033d0;f=2.6.14.1/cve-2005-2709-sysctl-unregistration-oops.patch
+ MISC:##URL##
+Description:
+ From: Al Viro <viro at zeniv.linux.org.uk>
+ .
+ You could open the /proc/sys/net/ipv4/conf/<if>/<whatever> file, then
+ wait for interface to go away, try to grab as much memory as possible in
+ hope to hit the (kfreed) ctl_table. Then fill it with pointers to your
+ function. Then do read from file you've opened and if you are lucky,
+ you'll get it called as ->proc_handler() in kernel mode.
+
+ So this is at least an Oops and possibly more. It does depend on an
+ interface going away though, so less of a security risk than it would
+ otherwise be.
+Notes:
+ CVE is reserved, so we can't take the description from there yet
+Bug:
+## per-tree status.
+## pending: fix has been committed to svn
+## released: we've cut a version with this fix in it
+## needed: bug is applicable to this tree and needs a fix
+## An empty value means that someone needs to determine the relevancy for this tree
+##
+##
+## status maybe followed by a version string in ()'s, and/or a patchname in []'s
+## Prerequisite patches maybe listed in [] as well, even though they may not be
+## directly part of the fix.
+upstream: pending (2.6.14.1)
+2.6.13: needed
+2.6.12:
+2.6.8-sarge-security:
+2.4.27-sarge-security:
+2.4.27:
More information about the Kernel-svn-changes
mailing list