summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2007-3739
blob: e06a758fa4e69194d2db0459c08dd581ffff53bf (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Candidate: CVE-2007-3739
References: 
 MLIST:[lkml] 20070129 [PATCH] Don't allow the stack to grow into hugetlb reserved regions
 URL:http://lkml.org/lkml/2007/1/29/180
 MISC:https://bugzilla.redhat.com/show_bug.cgi?id=253313
 REDHAT:RHSA-2007:0705
 URL:http://www.redhat.com/support/errata/RHSA-2007-0705.html
 SECUNIA:26760
 URL:http://secunia.com/advisories/26760
 XF:kernel-stack-expansion-dos(36592)
 URL:http://xforce.iss.net/xforce/xfdb/36592 
Description: 
 mm/mmap.c in the hugetlb kernel, when run on PowerPC systems, does
 not prevent stack expansion from entering into reserved kernel page
 memory, which allows local users to cause a denial of service (OOPS)
 via unspecified vectors.
Ubuntu-Description: 
 It was discovered that hugetlb kernels on PowerPC systems did not prevent
 the stack from colliding with reserved kernel memory.  Local attackers
 could exploit this and crash the system, causing a denial of service.
Notes: 
 jmm> 68589bc353037f233fe510ad9ff432338c95db66
Bugs: 
upstream: released (2.6.20)
linux-2.6: released (2.6.20)
2.6.18-etch-security: released (2.6.18.dfsg.1-13etch3) [bugfix/prevent-stack-growth-into-hugetlb-region.patch]
2.6.8-sarge-security: released (2.6.8-17sarge1) [prevent-stack-growth-into-hugetlb-region.dpatch]
2.4.27-sarge-security: N/A "files/functions non-existant in 2.4"
2.6.15-dapper-security: released (2.6.15-29.59)
2.6.17-edgy-security: released (2.6.17.1-12.41 ae30f170a8c2988179b2b34c7e562f57eb0556bc)
2.6.20-feisty-security: released (2.6.20-16.32 e84eef7bd84cb46ae573e21d4047fa2a65072294)

© 2014-2024 Faster IT GmbH | imprint | privacy policy