Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading
Not critical

Linux Kernel Potential Buffer Overflow and Denial of Service

-

Release Date:  2005-11-01    Last Update:  2006-05-24    Views:  16,280

Secunia Advisory SA17384

Where:

Local system

Impact:

Unknown, DoS

Solution Status:

Vendor Patch

Operating System:

CVE Reference(s):

Description


Some vulnerabilities have been reported in the Linux Kernel. Two has an unknown impact, the others can potentially be exploited by malicious, local users to cause a DoS (Denial of Service)

1) A boundary error due to missing parameter validation in the "map_to_seg7()" function in "drivers/usb/input/map_to_7segment.h" of the Yealink driver may cause out-of-bound memory references.

2) A boundary error in "/drivers/i2c/i2c-core.c" when handling SMBus Block Write transactions may cause a buffer overflow.

3) An error exists in the handling of locking in the POSIX timer cleanup code when running on SMP systems. This may be exploited by local users to cause a DoS.

4) A race condition in the "do_coredump()" function in "/kernel/signal.c" can be exploited by malicious users to cause a DoS by triggering a core dump in one thread while another thread has a pending SIGSTOP.

5) An error within the implementation of module reference counting for loadable protocol modules of netfilter can be exploited by local users to crash the kernel by performing certain socket operations.

6) Incorrect setting of the VM_IO flag within the sg driver (drivers/scsi/sg.c) can be exploited by a local user to cause a DoS (crash) via a dio transfer to memory mapped (mmap) IO space.


Solution:
The vulnerabilities have been fixed in version 2.6.14-git4.

Further details available to Secunia VIM customers

Provided and/or discovered by:
1-5) Reported by vendor.
6) Ahmed Teirelbar, Doug Gilbert.

Original Advisory:
http://marc.theaimsgroup.com/?l=linux-scsi&m=112540053711489&w=2

Kernel.org:
http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.14-git4.log
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=af64a5ebb817532965d18b792d6d74afecfb0bcf
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=5c50d1885981537ff3b8df6433951de6c9cb72cb
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.14
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=25f407f0b668f5e4ebd5d13e1fb4306ba6427ead
http://www.kernel.org/git/?p=linux/kernel/git/gregkh/linux-2.6.14.y.git;a=commit;h=788e05a67c343fa22f2ae1d3ca264e7f15c25eaf
http://www.kernel.org/git/?p=linux/kernel/git/gregkh/linux-2.6.14.y.git;a=commit;h=a79af59efd20990473d579b1d8d70bb120f0920c
http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.16.y.git;a=commit;h=1c8e71d72026ed4c6ba0fdfd7eebd865f4fd1415

Deep Links:
Links available to Secunia VIM customers

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: Linux Kernel Potential Buffer Overflow and Denial of Service

No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Factsheets
Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability