TITLE: Linux Kernel 32bit System Call Emulation and ELF Binary Vulnerabilities
SECUNIA ADVISORY ID: SA13627
VERIFY ADVISORY: http://secunia.com/advisories/13627/
CRITICAL: Less critical
IMPACT: Privilege escalation, DoS
WHERE: Local system
OPERATING SYSTEM: Linux Kernel 2.4.x http://secunia.com/product/763/
DESCRIPTION: Two vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially gain escalated privileges.
1) A boundary error exists in the system call handling in the 32bit system call emulation on AMD64 / Intel EM64T systems.
2) An unspecified error within the memory management handling of ELF executables in "load_elf_binary" can be exploited to crash the system via a specially crafted ELF binary.
Issue 2 only affects Kernel versions prior to 2.4.26.
SOLUTION: Issue 2 has been fixed in Kernel version 2.4.26 and later.
Secunia is currently not aware of an official updated version which fixes issue 1. However, updated packages have been issued by some Linux vendors.
Do not grant access to untrusted users.
PROVIDED AND/OR DISCOVERED BY: 1) Petr Vandrovec 2) Kirill Korotaev
ORIGINAL ADVISORY: http://rhn.redhat.com/errata/RHSA-2004-689.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.