TITLE: Linux Kernel Multiple Vulnerabilities SECUNIA ADVISORY ID: SA18216 VERIFY ADVISORY: http://secunia.com/advisories/18216/ CRITICAL: Less critical IMPACT: Unknown, DoS WHERE: Local system OPERATING SYSTEM: Linux Kernel 2.6.x http://secunia.com/product/2719/ DESCRIPTION: Some vulnerabilities have been reported in the Linux Kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service) and with unknown impact. 1) An error in "mm/mempolicy.c" when handling the policy system call may cause the referencing of undefined nodes. This can potentially be exploited by local users to cause kernel panic via a "set_mempolicy()" call with a 0 bitmask. 2) An error in "net/ipv4/fib_frontend.c" when validating the header and payload of fib_lookup netlink messages may result in illegal memory references via malformed netlink messages. 3) An off-by-one error in "kernel/sysctl.c" may cause the user supplied buffer to be overflowed with a single NULL byte when the output string is too large to fit in the buffer. 4) A boundary error in the CA-driver for TwinHan DST Frontend/Card, "drivers/media/dvb/bt8xx/dst_ca.c", may cause a buffer overflow when more than 8 bytes are read into an 8 byte long array. The vulnerabilities have been reported in the 2.6 kernel branch. SOLUTION: Update to version 2.6.15. PROVIDED AND/OR DISCOVERED BY: 1) Doug Chapman 3) Yi Yang 4) Perceval Anichini ORIGINAL ADVISORY: Kernel.org: http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8f493d797bc1fe470377adc9d8775845427e240e http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ea86575eaf99a9262a969309d934318028dbfacb http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8febdd85adaa41fa1fc1cb31286210fc2cd3ed0c http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=5c15c0b4fa850543b8ccfcf93686d24456cc384d Red Hat Bugzilla: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=175683 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------