Linux Kernel raw_sendmsg() Unspecified Memory Manipulation

2005-09-09T17:45:55
ID OSVDB:19261
Type osvdb
Reporter Al Viro(aviro@redhat.com)
Modified 2005-09-09T17:45:55

Description

Vulnerability Description

Linux kernel contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered by an error in the "raw_sendmsg()" function, which may allow a local unprivileged user to read kernel memory contents to obtain sensitive information or on some architectures cause a denial of service by manipulating hardware state, resulting in a loss of confidentiality and/or availability.

Solution Description

Upgrade to kernel version 2.6.13.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

Linux kernel contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered by an error in the "raw_sendmsg()" function, which may allow a local unprivileged user to read kernel memory contents to obtain sensitive information or on some architectures cause a denial of service by manipulating hardware state, resulting in a loss of confidentiality and/or availability.

References:

Vendor Specific News/Changelog Entry: http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.13.1 Vendor Specific News/Changelog Entry: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=166830 Secunia Advisory ID:17918 Secunia Advisory ID:16910 Secunia Advisory ID:17073 Secunia Advisory ID:16747 Secunia Advisory ID:16861 Related OSVDB ID: 19260 RedHat RHSA: RHSA-2005:514 Other Advisory URL: http://lists.suse.com/archive/suse-security-announce/2005-Dec/0004.html ISS X-Force ID: 22218 FrSIRT Advisory: ADV-2005-1701 CVE-2005-2492 Bugtraq ID: 14787