Candidate: CVE-2005-2456 References: http://www.mail-archive.com/netdev@vger.kernel.org/msg00520.html http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a4f1bac62564049ea4718c4624b0fadc9f597c84 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=blobdiff;h=8da3e25b2c4c1f305fd85428d3a9eb62b543bfba;hp=ecade4893a139cc35d4fe345ce70242ede5358c4;hb=a4f1bac62564049ea4718c4624b0fadc9f597c84;f=net/xfrm/xfrm_user.c http://frontal2.mandriva.com/security/advisories?name=MDKSA-2005:219 http://frontal2.mandriva.com/security/advisories?name=MDKSA-2005:220 http://www.ubuntulinux.org/support/documentation/usn/usn-169-1 http://www.novell.com/linux/security/advisories/2005_50_kernel.html http://www.securityfocus.com/bid/14477 http://secunia.com/advisories/16298 http://secunia.com/advisories/16500 http://xforce.iss.net/xforce/xfdb/21710 Description: Array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c in Linux kernel 2.6 allows local users to cause a denial of service (oops or deadlock) and possibly execute arbitrary code via a p->dir value that is larger than XFRM_POLICY_OUT, which is used as an index in the sock->sk_policy array. Notes: Bugs: 321401 upstream: linux-2.6: released (2.6.12-2) 2.6.8-sarge-security: released (2.6.8-16sarge1) 2.4.27-sarge-security: released (2.4.27-10sarge1) [176_ipsec-array-overflow.diff] 2.4.19-woody-security: 2.4.18-woody-security: 2.4.17-woody-security: 2.4.16-woody-security: 2.4.17-woody-security-hppa: 2.4.17-woody-security-ia64: 2.4.18-woody-security-hppa: