[kernel] r5390 - patch-tracking

Dann Frazier dannf at costa.debian.org
Tue Jan 10 20:25:57 UTC 2006


Author: dannf
Date: Tue Jan 10 20:25:56 2006
New Revision: 5390

Added:
   patch-tracking/CVE-2005-4635
      - copied, changed from r5389, patch-tracking/00boilerplate
Log:
our kernel revs aren't vulnerable

Copied: patch-tracking/CVE-2005-4635 (from r5389, patch-tracking/00boilerplate)
==============================================================================
--- patch-tracking/00boilerplate	(original)
+++ patch-tracking/CVE-2005-4635	Tue Jan 10 20:25:56 2006
@@ -1,17 +1,31 @@
-Candidate: 
+Candidate: CVE-2005-4635
 References: 
+ MISC:http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ea86575eaf99a9262a969309d934318028dbfacb
+ CONFIRM:http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15
+ BID:16139
+ URL:http://www.securityfocus.com/bid/16139
+ FRSIRT:ADV-2006-0035
+ URL:http://www.frsirt.com/english/advisories/2006/0035
+ SECUNIA:18216
+ URL:http://secunia.com/advisories/18216 
 Description: 
+ The nl_fib_input function in fib_frontend.c in the Linux kernel before 2.6.15
+ does not check for valid lengths of the header and payload, which allows
+ remote attackers to cause a denial of service (invalid memory reference) via
+ malformed fib_lookup netlink messages.
 Notes: 
+ dannf> Well, I don't know how it could be exploited by an unpriveleged user -  dannf> but I don't think we need to worry about it.  The vulnerable function
+ dannf> wasn't added until after 2.6.12, and is already fixed in 2.6.15.
 Bugs: 
-upstream: 
-linux-2.6:
-2.6.8-sarge-security: 
-2.4.27-sarge-security: 
-2.6.8: 
-2.4.27:
-2.4.19-woody-security: 
-2.4.18-woody-security: 
-2.4.17-woody-security: 
-2.4.16-woody-security: 
-2.4.17-woody-security-hppa: 
-2.4.17-woody-security-ia64: 
+upstream: released (2.6.15)
+linux-2.6: released (2.6.15-1)
+2.6.8-sarge-security: N/A
+2.4.27-sarge-security: N/A
+2.6.8: N/A
+2.4.27: N/A
+2.4.19-woody-security: N/A
+2.4.18-woody-security: N/A
+2.4.17-woody-security: N/A
+2.4.16-woody-security: N/A
+2.4.17-woody-security-hppa: N/A
+2.4.17-woody-security-ia64: N/A



More information about the Kernel-svn-changes mailing list