[kernel] r4868 - patch-tracking
Dann Frazier
dannf at costa.debian.org
Tue Nov 22 15:49:09 UTC 2005
Author: dannf
Date: Tue Nov 22 15:49:07 2005
New Revision: 4868
Added:
patch-tracking/CVE-2005-2100
- copied, changed from r4853, patch-tracking/00boilerplate
patch-tracking/CVE-2005-2708
- copied, changed from r4853, patch-tracking/00boilerplate
Log:
a couple new issues from moritz
Copied: patch-tracking/CVE-2005-2100 (from r4853, patch-tracking/00boilerplate)
==============================================================================
--- patch-tracking/00boilerplate (original)
+++ patch-tracking/CVE-2005-2100 Tue Nov 22 15:49:07 2005
@@ -1,6 +1,12 @@
-Candidate:
+Candidate: CVE-2005-2100
References:
+ CONFIRM:https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=165547
+ REDHAT:RHSA-2005:514
+ URL:http://www.redhat.com/support/errata/RHSA-2005-514.html
Description:
+ The rw_vm function in usercopy.c in the 4GB split patch for the Linux kernel in
+ Red Hat Enterprise Linux 4 does not perform proper bounds checking, which allows
+ local users to cause a denial of service (crash).
Notes:
Bugs:
upstream:
Copied: patch-tracking/CVE-2005-2708 (from r4853, patch-tracking/00boilerplate)
==============================================================================
--- patch-tracking/00boilerplate (original)
+++ patch-tracking/CVE-2005-2708 Tue Nov 22 15:49:07 2005
@@ -1,6 +1,11 @@
-Candidate:
+Candidate: CVE-2005-2708
References:
+ CONFIRM:https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=161925
Description:
+ The search_binary_handler function in exec.c in Linux kernel on 64-bit x86
+ architectures does not check a return code for a particular function call when
+ virtual memory is low, which allows local users to cause a denial of service
+ (panic), as demonstrated by running a process using the bash ulimit -v command.
Notes:
Bugs:
upstream:
More information about the Kernel-svn-changes
mailing list