[kernel] r5331 - patch-tracking
Moritz Muehlenhoff
jmm-guest at costa.debian.org
Fri Jan 6 23:36:36 UTC 2006
Author: jmm-guest
Date: Fri Jan 6 23:36:29 2006
New Revision: 5331
Modified:
patch-tracking/CVE-2004-1234
Log:
CVE-2004-1234 resolved for Sarge
Modified: patch-tracking/CVE-2004-1234
==============================================================================
--- patch-tracking/CVE-2004-1234 (original)
+++ patch-tracking/CVE-2004-1234 Fri Jan 6 23:36:29 2006
@@ -15,12 +15,18 @@
load_elf_binary in Linux before 2.4.26 allows local users to cause a denial of
service (system crash) via an ELF binary in which the interpreter is NULL.
Notes:
+ jmm> I don't know at which version this was merged into 2.6, but I've verified
+ jmm> that above-mentioned fix is included in 2.6.8's binfmt_elf.c:
+ jmm> out_free_dentry:
+ jmm> allow_write_access(interpreter);
+ jmm> if (interpreter)
+ jmm> fput(interpreter);
Bugs:
-upstream:
-linux-2.6:
-2.6.8-sarge-security:
-2.4.27-sarge-security:
-2.6.8:
+upstream: released (2.4.26-rc3)
+linux-2.6: N/A
+2.6.8-sarge-security: N/A
+2.4.27-sarge-security: N/A
+2.6.8: N/A
2.4.19-woody-security: pending (2.4.19-4.woody3)
2.4.18-woody-security: released (2.4.18-14.4)
2.4.17-woody-security: pending (2.4.17-1woody4)
More information about the Kernel-svn-changes
mailing list