Linux Kernel SDLA WAN Driver Memory Disclosure

2004-04-16T06:48:25
ID OSVDB:6573
Type osvdb
Reporter Ken Ashcraft(ken@coverity.com)
Modified 2004-04-16T06:48:25

Description

Vulnerability Description

The Linux kernel contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when data is copied from sdla_read() to memory, which can disclose 128k of kernel memory, resulting in a loss of confidentiality. However, only root is capable of providing data to sdla_read().

Solution Description

Upgrade to kernel version 2.6.6-rc2 or higher, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by implementing the following workaround(s): do not allow untrusted users to log in to the local system as root.

Short Description

The Linux kernel contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when data is copied from sdla_read() to memory, which can disclose 128k of kernel memory, resulting in a loss of confidentiality. However, only root is capable of providing data to sdla_read().

References:

Vendor URL: http://www.kernel.org/ Vendor Specific Advisory URL Vendor Specific Advisory URL Vendor Specific Advisory URL Secunia Advisory ID:18977 Secunia Advisory ID:11626 Secunia Advisory ID:19369 Related OSVDB ID: 6307 Mail List Post: http://marc.theaimsgroup.com/?l=linux-kernel&m=108213523030857&w=2 Mail List Post: http://marc.theaimsgroup.com/?l=linux-kernel&m=108216403925798&w=2 CVE-2004-2607 CVE-2005-3965