blob: 90b2a29a12e0bfd5bf6f83739c595dbcc2b7d15d (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
|
Candidate: CVE-2005-2456
References:
http://www.mail-archive.com/netdev@vger.kernel.org/msg00520.html
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a4f1bac62564049ea4718c4624b0fadc9f597c84
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=blobdiff;h=8da3e25b2c4c1f305fd85428d3a9eb62b543bfba;hp=ecade4893a139cc35d4fe345ce70242ede5358c4;hb=a4f1bac62564049ea4718c4624b0fadc9f597c84;f=net/xfrm/xfrm_user.c
http://frontal2.mandriva.com/security/advisories?name=MDKSA-2005:219
http://frontal2.mandriva.com/security/advisories?name=MDKSA-2005:220
http://www.ubuntulinux.org/support/documentation/usn/usn-169-1
http://www.novell.com/linux/security/advisories/2005_50_kernel.html
http://www.securityfocus.com/bid/14477
http://secunia.com/advisories/16298
http://secunia.com/advisories/16500
http://xforce.iss.net/xforce/xfdb/21710
Description:
Array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c
in Linux kernel 2.6 allows local users to cause a denial of service (oops
or deadlock) and possibly execute arbitrary code via a p->dir value that is
larger than XFRM_POLICY_OUT, which is used as an index in the sock->sk_policy
array.
Notes:
Bugs: 321401
upstream:
linux-2.6: released (2.6.12-2)
2.6.8-sarge-security: released (2.6.8-16sarge1)
2.4.27-sarge-security: released (2.4.27-10sarge1) [176_ipsec-array-overflow.diff]
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
2.4.16-woody-security:
2.4.17-woody-security-hppa:
2.4.17-woody-security-ia64:
2.4.18-woody-security-hppa:
|