Bugzilla – Bug 93652
VUL-0: CVE-2005-2500: kernel: Overflow in xdr input validation
Last modified: 2021-11-04 16:21:32 UTC
The bounds check in xdr_xcode_array2 can overflow. Reported by Florian Weimer <fw@deneb.enyo.de>. This affects the nfsacl protocol.
Created attachment 39735 [details] Proposed fix Already in the SP2 CVS, so it will be in RC4.
please assign and/or cc security team on such issues generally ;) ccing the oither usual suspects too.
potential remote dos
please apply to all 2.6 based branches. (SL92, SL93 are missing I think.) Is 2.4 affected too?
just looked at 2.4.21 ... it has way less xdr stuff and is not affected by this problem assign to agruen for apply
It's on the SL91, SL92, SL93, and SLES9_SP1 branches as well now. 2.4 is not affected. Back to security team.
thanks!
Did this come from upstream or directly to us? Does it have a CAN#?
It came via the LKML. I don't think it has a CAN #.
updates released
====================================================== Candidate: CAN-2005-2500 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2500 Reference: MISC:http://lkml.org/lkml/2005/6/23/19 Reference: CONFIRM:http://lkml.org/lkml/2005/6/23/126 Reference: SUSE:SUSE-SA:2005:044 Reference: +URL:http://www.novell.com/linux/security/advisories/2005_44_kernel.html Buffer overflow in the xdr_xcode_array2 function in xdr.c in Linux kernel 2.6.5 and earlier might allow remote attackers to cause a denial of service and possibly execute arbitrary code via crafted XDR data for the nfsacl protocol.
I have disabled the patch, it conflicts with this commit from 2.6.13-rc6-git9: http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=58fcb8df0bf663bb6b8f46cd3010bfe8d13d97cf
This has resurfaced today.
*** This bug has been marked as a duplicate of 105101 ***
CVE-2005-2500: CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)