kernel-source-2.4.17 -- several vulnerabilities

2006-05-29T00:00:00
ID DSA-1082
Type debian
Reporter Debian
Modified 2006-05-29T00:00:00

Description

Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems:

A local denial of service vulnerability in do_fork() has been found.

A local denial of service vulnerability in proc memory handling has been found.

A buffer overflow in the panic handling code has been found.

A local denial of service vulnerability through a null pointer dereference in the IA64 process handling code has been found.

A local denial of service vulnerability through an infinite loop in the signal handler code has been found.

An information leak in the context switch code has been found on the IA64 architecture.

Unsafe use of copy_to_user in USB drivers may disclose sensitive information.

A race condition in the i386 page fault handler may allow privilege escalation.

Multiple vulnerabilities in the SMB filesystem code may allow denial of service or information disclosure.

An information leak discovered in the SMB filesystem code.

A local denial of service vulnerability has been found in the SCM layer.

An integer overflow in the terminal code may allow a local denial of service vulnerability.

A local privilege escalation in the MIPS assembly code has been found.

A memory leak in the ip_options_get() function may lead to denial of service.

Multiple overflows exist in the io_edgeport driver which might be usable as a denial of service attack vector.

Bryan Fulton reported a bounds checking bug in the coda_pioctl function which may allow local users to execute arbitrary code or trigger a denial of service attack.

Inproper initialization of the RTC may disclose information.

Insufficient input sanitising in the load_elf_binary() function may lead to privilege escalation.

Incorrect error handling in the binfmt_elf loader may lead to privilege escalation.

A buffer overflow in the binfmt_elf loader may lead to privilege escalation or denial of service.

The open_exec function may disclose information.

The binfmt code is vulnerable to denial of service through malformed a.out binaries.

A denial of service vulnerability in the ELF loader has been found.

A programming error in the unix_dgram_recvmsg() function may lead to privilege escalation.

The ELF loader is vulnerable to denial of service through malformed binaries.

Crafted ELF binaries may lead to privilege escalation, due to insufficient checking of overlapping memory regions.

A race condition in the load_elf_library() and binfmt_aout() functions may allow privilege escalation.

An integer overflow in the Moxa driver may lead to privilege escalation.

A remote denial of service vulnerability has been found in the PPP driver.

An IA64 specific local denial of service vulnerability has been found in the unw_unwind_to_user() function.

The following matrix explains which kernel version for which architecture fixes the problems mentioned above:

| Debian 3.1 (sarge)
---|---
Source | 2.4.17-1woody4
HP Precision architecture | 32.5
Intel IA-64 architecture | 011226.18
IBM S/390 architecture/image| 2.4.17-2.woody.5
IBM S/390 architecture/patch| 0.0.20020816-0.woody.4
PowerPC architecture (apus) | 2.4.17-6
MIPS architecture | 2.4.17-0.020226.2.woody7

We recommend that you upgrade your kernel package immediately and reboot the machine.