OSDN Git Service

old buffer overflow in moxa driver (CVE-2005-0504)
authordann frazier <dannf@hp.com>
Tue, 8 May 2007 07:31:39 +0000 (00:31 -0700)
committerWilly Tarreau <w@1wt.eu>
Sun, 1 Jun 2008 18:23:56 +0000 (20:23 +0200)
commitfee3cb64346b2106b1963135947a7d00dae8e232
treecd79efb4a2ec3923f248be05077a3db53a33f816
parentb6dd8a591e7a61a071a357a951ca64b296fc5c21
old buffer overflow in moxa driver (CVE-2005-0504)

[backport of 2.6 commit a2f72982e22b96862f8f15272732bd316d4db040]

old buffer overflow in moxa driver

I noticed that the moxa input checking security bug described by
CVE-2005-0504 appears to remain unfixed upstream.

The issue is described here:
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0504

Debian has been shipping the following patch from Andres Salomon.

(akpm: it's a privileged operation)

Signed-off-by: dann frazier <dannf@hp.com>
Signed-off-by: Andres Salomon <dilinger@debian.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Willy Tarreau <w@1wt.eu>
drivers/char/moxa.c