summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2006-5753
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2008-02-22 21:53:05 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2008-02-22 21:53:05 +0000
commit0394957db79db8afcae11908388c24464b8d744f (patch)
tree8f82b84cda898d89f438bc4c4e7b00e8d0324b60 /retired/CVE-2006-5753
parent60e5f903d389fc77fb16d492f07f52e65c20be16 (diff)
retire some issues
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1140 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2006-5753')
-rw-r--r--retired/CVE-2006-575325
1 files changed, 25 insertions, 0 deletions
diff --git a/retired/CVE-2006-5753 b/retired/CVE-2006-5753
new file mode 100644
index 00000000..442cf6a9
--- /dev/null
+++ b/retired/CVE-2006-5753
@@ -0,0 +1,25 @@
+Candidate: CVE-2006-5753
+References:
+ http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=be6aab0e9fa6d3c6d75aa1e38ac972d8b4ee82b8
+Description:
+ The listxattr syscall can corrupt user space under certain
+ circumstances. The problem seems to be related to signed/unsigned
+ conversion during size promotion. The function return_EIO returns an
+ int but its used as a ssize_t with a comparison to 0. This causes the
+ range check to fail and copy_to_user copies way too much.
+ The command line "fsfuzz iso9660" can easily reproduce this behavior.
+Ubuntu-Description:
+ Various syscalls (like listxattr()) misinterpreted the return value
+ of return_EIO() when encountering bad inodes. By issuing particular
+ system calls on a malformed file system, a local attacker could
+ exploit this to crash the kernel.
+Notes:
+Bugs:
+upstream: released (2.6.20-rc5)
+linux-2.6: released (2.6.20-1)
+2.6.18-etch-security: released (2.6.18.dfsg.1-13) [bugfix/listxattr-mem-corruption.patch]
+2.6.8-sarge-security: released (2.6.8-16sarge7) [listxattr-mem-corruption.dpatch]
+2.4.27-sarge-security: released (2.4.27-10sarge6) [261_listxattr-mem-corruption.diff]
+2.6.12-breezy-security: released (2.6.12-10.43)
+2.6.15-dapper-security: released (2.6.15-28.51)
+2.6.17-edgy-security: released (2.6.17.1-11.35)

© 2014-2024 Faster IT GmbH | imprint | privacy policy