[kernel] r5331 - patch-tracking

Moritz Muehlenhoff jmm-guest at costa.debian.org
Fri Jan 6 23:36:36 UTC 2006


Author: jmm-guest
Date: Fri Jan  6 23:36:29 2006
New Revision: 5331

Modified:
   patch-tracking/CVE-2004-1234
Log:
CVE-2004-1234 resolved for Sarge


Modified: patch-tracking/CVE-2004-1234
==============================================================================
--- patch-tracking/CVE-2004-1234	(original)
+++ patch-tracking/CVE-2004-1234	Fri Jan  6 23:36:29 2006
@@ -15,12 +15,18 @@
  load_elf_binary in Linux before 2.4.26 allows local users to cause a denial of
  service (system crash) via an ELF binary in which the interpreter is NULL.
 Notes: 
+ jmm> I don't know at which version this was merged into 2.6, but I've verified
+ jmm> that above-mentioned fix is included in 2.6.8's binfmt_elf.c:
+ jmm>  out_free_dentry:
+ jmm>         allow_write_access(interpreter);
+ jmm>       if (interpreter)
+ jmm>            fput(interpreter);
 Bugs: 
-upstream: 
-linux-2.6: 
-2.6.8-sarge-security: 
-2.4.27-sarge-security: 
-2.6.8: 
+upstream: released (2.4.26-rc3)
+linux-2.6: N/A
+2.6.8-sarge-security: N/A
+2.4.27-sarge-security: N/A
+2.6.8: N/A
 2.4.19-woody-security: pending (2.4.19-4.woody3)
 2.4.18-woody-security: released (2.4.18-14.4)
 2.4.17-woody-security: pending (2.4.17-1woody4)



More information about the Kernel-svn-changes mailing list