Candidate: CVE-2004-1333 References: FULLDISC:20041215 fun with linux kernel URL:http://www.securitytrap.com/mail/full-disclosure/2004/Dec/0323.html MISC:http://www.guninski.com/where_do_you_want_billg_to_go_today_2.html FEDORA:FLSA:152532 URL:https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532 SUSE:SUSE-SA:2005:018 URL:http://www.novell.com/linux/security/advisories/2005_18_kernel.html UBUNTU:USN-47-1 URL:http://www.ubuntulinux.org/support/documentation/usn/usn-47-1 BID:11956 URL:http://www.securityfocus.com/bid/11956 XF:linux-vcresize-dos(18523) URL:http://xforce.iss.net/xforce/xfdb/18523 Description: Integer overflow in the vc_resize function in the Linux kernel 2.4 and 2.6 before 2.6.10 allows local users to cause a denial of service (kernel crash) via a short new screen value, which leads to a buffer overflow. Notes: Bugs: upstream: released (2.6.10) linux-2.6: N/A 2.6.8-sarge-security: released (2.6.8-11) [vt-of-death.dpatch] 2.4.27-sarge-security: released (2.4.27-9) [136_vc_resizing_overflow.diff] 2.4.19-woody-security: released (2.4.19-4.woody3) 2.4.18-woody-security: released (2.4.18-14.4) 2.4.17-woody-security: released (2.4.17-1woody4) 2.4.16-woody-security: released (2.4.16-1woody3) 2.4.17-woody-security-hppa: released (32.5) 2.4.17-woody-security-ia64: released (011226.18) 2.4.18-woody-security-hppa: released (62.4)