[kernel] r5628 - patch-tracking
Dann Frazier
dannf at costa.debian.org
Mon Jan 30 01:02:45 UTC 2006
Author: dannf
Date: Mon Jan 30 01:02:44 2006
New Revision: 5628
Modified:
patch-tracking/CVE-2005-0530
Log:
marcello says 2.4 isn't affected
Modified: patch-tracking/CVE-2005-0530
==============================================================================
--- patch-tracking/CVE-2005-0530 (original)
+++ patch-tracking/CVE-2005-0530 Mon Jan 30 01:02:44 2006
@@ -15,15 +15,24 @@
kernel 2.6.10 and 2.6.11rc1 allows local users to read kernel memory via a
negative argument.
Notes:
+ dannf> This doesn't affect 2.4:
+ marcello> v2.4 does not suffer from the issue mentioned by Guninski because
+ marcello> the first argument of the arithmetic comparison is not casted
+ marcello> to a "signed" value:
+ .
+ marcello> n = min((ssize_t)*nr, n);
+ .
+ marcello> That was the problem in v2.6, where an unsigned value bigger than
+ marcello> 2^31 would be treated as a negative signed.
Bugs:
-upstream:
-linux-2.6:
+upstream: released (2.6.11)
+linux-2.6: N/A
2.6.8-sarge-security: released (2.6.8-14) [116-n_tty_copy_from_read_buf_signedness_fixes.dpatch]
-2.4.27-sarge-security:
-2.4.19-woody-security:
-2.4.18-woody-security:
-2.4.17-woody-security:
-2.4.16-woody-security:
-2.4.17-woody-security-hppa:
-2.4.17-woody-security-ia64:
-2.4.18-woody-security-hppa:
+2.4.27-sarge-security: N/A
+2.4.19-woody-security: N/A
+2.4.18-woody-security: N/A
+2.4.17-woody-security: N/A
+2.4.16-woody-security: N/A
+2.4.17-woody-security-hppa: N/A
+2.4.17-woody-security-ia64: N/A
+2.4.18-woody-security-hppa: N/A
More information about the Kernel-svn-changes
mailing list