blob: d6f8f31af7bbd9f83c15de3e8968722dcb372cb6 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
|
Candidate: CVE-2005-0528
References:
Description:
Notes:
From Joey's 2.4.18-14.4 changelog:
* Applied patch by Andrea Arcangeli from 2.4.24 to fix privilege
escalation in the mremap() syscall [mm/mremap.c, CAN-2004-nnnn]
jmm> Isn't this CVE-2004-0077?
dannf> Looks like this is a different issue. Joey's patch is here:
http://klecker.debian.org/~joey/security/kernel/patches/patch.CAN-2005-0528.mremap
dannf> But it doesn't look like mitre has released the details yet:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0528
jmm> The patch is merged as of 2.4.27, but I'm not sure at which exact version
dannf> It looks like this would apply to 2.6, but isn't necessary because
dannf> its already fixed in a different way. 2.6 checks for a 0 new_len
dannf> earlier and errors out
jmm> This turned out to be a dupe of CVE-2003-0985
dannf> THIS CVE HAS BEEN REJECTED - USE CVE-2003-0985 instead
Bugs:
upstream: N/A
linux-2.6: N/A
2.6.8-sarge-security: N/A
2.4.27-sarge-security: N/A
2.4.19-woody-security: released (2.4.19-4.woody3)
2.4.18-woody-security: released (2.4.18-14.4)
2.4.17-woody-security: released (2.4.17-1woody4)
2.4.16-woody-security: released (2.4.16-1woody3)
2.4.17-woody-security-hppa: released (32.5)
2.4.17-woody-security-ia64: released (011226.18)
|