Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:10901
HistoryJan 05, 2006 - 12:00 a.m.

[SA18216] Linux Kernel Multiple Vulnerabilities

2006-01-0500:00:00
vulners.com
6

TITLE:
Linux Kernel Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA18216

VERIFY ADVISORY:
http://secunia.com/advisories/18216/

CRITICAL:
Less critical

IMPACT:
Unknown, DoS

WHERE:
Local system

OPERATING SYSTEM:
Linux Kernel 2.6.x
http://secunia.com/product/2719/

DESCRIPTION:
Some vulnerabilities have been reported in the Linux Kernel, which
potentially can be exploited by malicious, local users to cause a DoS
(Denial of Service) and with unknown impact.

1) An error in "mm/mempolicy.c" when handling the policy system call
may cause the referencing of undefined nodes. This can potentially be
exploited by local users to cause kernel panic via a "set_mempolicy()"
call with a 0 bitmask.

2) An error in "net/ipv4/fib_frontend.c" when validating the header
and payload of fib_lookup netlink messages may result in illegal
memory references via malformed netlink messages.

3) An off-by-one error in "kernel/sysctl.c" may cause the user
supplied buffer to be overflowed with a single NULL byte when the
output string is too large to fit in the buffer.

4) A boundary error in the CA-driver for TwinHan DST Frontend/Card,
"drivers/media/dvb/bt8xx/dst_ca.c", may cause a buffer overflow when
more than 8 bytes are read into an 8 byte long array.

The vulnerabilities have been reported in the 2.6 kernel branch.

SOLUTION:
Update to version 2.6.15.

PROVIDED AND/OR DISCOVERED BY:
1) Doug Chapman
3) Yi Yang
4) Perceval Anichini

ORIGINAL ADVISORY:
Kernel.org:
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8f493d797bc1fe470377adc9d8775845427e240e
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ea86575eaf99a9262a969309d934318028dbfacb
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8febdd85adaa41fa1fc1cb31286210fc2cd3ed0c
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=5c15c0b4fa850543b8ccfcf93686d24456cc384d

Red Hat Bugzilla:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=175683


About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=3APA3A%40security.nnov.ru