ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: [SA18216] Linux Kernel Multiple Vulnerabilities



> 
> 
> TITLE:
> Linux Kernel Multiple Vulnerabilities
> 
> SECUNIA ADVISORY ID:
> SA18216
> 
> VERIFY ADVISORY:
> http://secunia.com/advisories/18216/
> 
> CRITICAL:
> Less critical
> 
> IMPACT:
> Unknown, DoS
> 
> WHERE:
> Local system
> 
> OPERATING SYSTEM:
> Linux Kernel 2.6.x
> http://secunia.com/product/2719/
> 
> DESCRIPTION:
> Some vulnerabilities have been reported in the Linux Kernel, which
> potentially can be exploited by malicious, local users to cause a DoS
> (Denial of Service) and with unknown impact.
> 
> 1) An error in "mm/mempolicy.c" when handling the policy system call
> may cause the referencing of undefined nodes. This can potentially be
> exploited by local users to cause kernel panic via a "set_mempolicy()"
> call with a 0 bitmask.
> 
> 2) An error in "net/ipv4/fib_frontend.c" when validating the header
> and payload of fib_lookup netlink messages may result in illegal
> memory references via malformed netlink messages.
> 
> 3) An off-by-one error in "kernel/sysctl.c" may cause the user
> supplied buffer to be overflowed with a single NULL byte when the
> output string is too large to fit in the buffer.
> 
> 4) A boundary error in the CA-driver for TwinHan DST Frontend/Card,
> "drivers/media/dvb/bt8xx/dst_ca.c", may cause a buffer overflow when
> more than 8 bytes are read into an 8 byte long array.
> 
> The vulnerabilities have been reported in the 2.6 kernel branch.
> 
> SOLUTION:
> Update to version 2.6.15.
> 
> PROVIDED AND/OR DISCOVERED BY:
> 1) Doug Chapman
> 3) Yi Yang
> 4) Perceval Anichini
> 
> ORIGINAL ADVISORY:
> Kernel.org:
> http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15
> http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2
> .6.git;a=commit;h=8f493d797bc1fe470377adc9d8775845427e240e
> http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2
> .6.git;a=commit;h=ea86575eaf99a9262a969309d934318028dbfacb
> http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2
> .6.git;a=commit;h=8febdd85adaa41fa1fc1cb31286210fc2cd3ed0c
> http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2
> .6.git;a=commit;h=5c15c0b4fa850543b8ccfcf93686d24456cc384d
> 
> Red Hat Bugzilla:
> https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=175683
> 
> ----------------------------------------------------------------------




 




Copyright © Lexa Software, 1996-2009.