Candidate: CVE-2004-1074 References: MLIST:[linux-kernel] 20041111 a.out issue URL:http://marc.theaimsgroup.com/?l=linux-kernel&m=110021173607372&w=2 CONECTIVA:CLA-2005:930 URL:http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 FEDORA:FLSA:2336 URL:https://bugzilla.fedora.us/show_bug.cgi?id=2336 MANDRAKE:MDKSA-2005:022 URL:http://www.mandrakesoft.com/security/advisories?name=MDKSA-2005:022 TRUSTIX:2005-0001 URL:http://www.trustix.org/errata/2005/0001/ BUGTRAQ:20041216 [USN-39-1] Linux amd64 kernel vulnerability URL:http://marc.theaimsgroup.com/?l=bugtraq&m=110322596918807&w=2 XF:linux-aout-binary-dos(18290) URL:http://xforce.iss.net/xforce/xfdb/18290 Description: The binfmt functionality in the Linux kernel, when "memory overcommit" is enabled, allows local users to cause a denial of service (kernel oops) via a malformed a.out binary. Notes: From Joey's 2.4.18-14.4 changelog: * Applied patch by Chris Wright to not insert overlapping regions in setup_arg_pages() [fs/exec.c, associated to CAN-2004-1074] * Applied patch by Chris Wright to fix error handling in do_brk() when setting up bss in a.out [fs/binfmt_aout.c, CAN-2004-1074] Bugs: upstream: released (2.6.10) linux-2.6.16: N/A linux-2.6: N/A 2.6.8-sarge-security: released (2.6.8-11) [binfmt-huge-vma-dos.dpatch, binfmt-huge-vma-dos2.dpatch] 2.4.27-sarge-security: released (2.4.27-7) [114-binfmt_aout-CVE-2004-1074.diff] 2.4.19-woody-security: released (2.4.19-4.woody3) 2.4.18-woody-security: released (2.4.18-14.4) 2.4.17-woody-security: released (2.4.17-1woody4) 2.4.16-woody-security: released (2.4.16-1woody3) 2.4.17-woody-security-hppa: released (32.5) 2.4.17-woody-security-ia64: released (011226.18) 2.4.18-woody-security-hppa: released (62.4)