summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2005-1768
blob: 00eb28330490129389ef81935565e2ca774692d8 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
Candidate: CVE-2005-1768
References: 
 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1768
 Final-Decision:
 Interim-Decision:
 Modified:
 Proposed:
 Assigned: 20050531
 Category: SF
 BUGTRAQ:20050711 [ Suresec Advisories ] - Linux kernel ia32 compatibility (ia64/x86-64)
 URL:http://marc.theaimsgroup.com/?l=bugtraq&m=112110120216116&w=2
 MISC:http://www.suresec.org/advisories/adv4.pdf
Description: 
 Race condition in the ia32 compatibility code for the execve system
 call in Linux kernel 2.4 before 2.4.31 and 2.6 before 2.6.6 allows
 local users to cause a denial of service (kernel panic) and possibly
 execute arbitrary code via a concurrent thread that increments a
 pointer count after the nargs function has counted the pointers, but
 before the count is copied from user space to kernel space, which
 leads to a buffer overflow.
Notes: 
 167_arch-ia64-x86_64_execve.diff (note 2.4 is not supported for amd64)
upstream: released (2.4.31, 2.6.6)
2.6.8-sarge-security: N/A
2.4.27-sid/sarge: released (2.4.27-11)
2.4.27-sarge-security: released (2.4.27-10sarge1)
linux-2.6: N/A
2.4.19-woody-security: 
2.4.18-woody-security: 
2.4.17-woody-security: 
2.4.16-woody-security: 
2.4.17-woody-security-hppa: 
2.4.17-woody-security-ia64: 
2.4.18-woody-security-hppa: 

© 2014-2024 Faster IT GmbH | imprint | privacy policy