[kernel] r5628 - patch-tracking

Dann Frazier dannf at costa.debian.org
Mon Jan 30 01:02:45 UTC 2006


Author: dannf
Date: Mon Jan 30 01:02:44 2006
New Revision: 5628

Modified:
   patch-tracking/CVE-2005-0530
Log:
marcello says 2.4 isn't affected


Modified: patch-tracking/CVE-2005-0530
==============================================================================
--- patch-tracking/CVE-2005-0530	(original)
+++ patch-tracking/CVE-2005-0530	Mon Jan 30 01:02:44 2006
@@ -15,15 +15,24 @@
  kernel 2.6.10 and 2.6.11rc1 allows local users to read kernel memory via a
  negative argument.
 Notes: 
+ dannf> This doesn't affect 2.4:
+  marcello> v2.4 does not suffer from the issue mentioned by Guninski because 
+  marcello> the first argument of the arithmetic comparison is not casted
+  marcello> to a "signed" value:
+ .
+  marcello> n = min((ssize_t)*nr, n);
+ .
+  marcello> That was the problem in v2.6, where an unsigned value bigger than
+  marcello> 2^31 would be treated as a negative signed.
 Bugs: 
-upstream: 
-linux-2.6: 
+upstream: released (2.6.11)
+linux-2.6: N/A
 2.6.8-sarge-security: released (2.6.8-14) [116-n_tty_copy_from_read_buf_signedness_fixes.dpatch]
-2.4.27-sarge-security: 
-2.4.19-woody-security: 
-2.4.18-woody-security: 
-2.4.17-woody-security: 
-2.4.16-woody-security: 
-2.4.17-woody-security-hppa: 
-2.4.17-woody-security-ia64: 
-2.4.18-woody-security-hppa: 
+2.4.27-sarge-security: N/A
+2.4.19-woody-security: N/A
+2.4.18-woody-security: N/A
+2.4.17-woody-security: N/A
+2.4.16-woody-security: N/A
+2.4.17-woody-security-hppa: N/A
+2.4.17-woody-security-ia64: N/A
+2.4.18-woody-security-hppa: N/A



More information about the Kernel-svn-changes mailing list