Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Linux Kernel Multiple Vulnerabilities

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » The DU Lounge Donate to DU
 
Nomad559 Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jan-11-05 09:34 AM
Original message
Linux Kernel Multiple Vulnerabilities
Linux Kernel Multiple Vulnerabilities

Less critical

http://secunia.com/advisories/13784

Impact:
Exposure of system information
Exposure of sensitive information
Privilege escalation
DoS


O/S
Linux Kernel 2.2.x
Linux Kernel 2.4.x
Linux Kernel 2.6.x


Description:
Multiple vulnerabilities have been reported in the Linux kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose sensitive information, or gain escalated privileges on a vulnerable system.

1) A signedness error in the "poolsize_strategy()" function of the random poolsize sysctl handler (drivers/char/random.c) can potentially be exploited to cause a buffer overflow when copying data from user space into kernel space.

Successful exploitation may crash the system or allow execution of arbitrary code with escalated privileges. However, exploitation requires UID 0, but not any root capabilities.

The vulnerability has been reported in the 2.4 and 2.6 kernel branches.

2) Two signedness errors in the "sg_scsi_ioctl()" function in "drivers/block/scsi_ioctl.c" can be exploited to cause a buffer overflow or disclose large portions of kernel memory when copying data to and from user space.

Successful exploitation may disclose sensitive information, crash the system, or potentially allow execution of arbitrary code with escalated privileges.

The vulnerabilities have been reported in the 2.6 kernel branch.

3) Boundary errors in various functions of the MOXA serial driver (drivers/char/moxa.c) can be exploited to cause buffer overflows when copying data from user space into a kernel space buffer.

Successful exploitation may allow execution of arbitrary code with escalated privileges.

The vulnerabilities have been reported in the 2.2, 2.4, and 2.6 kernel branches.

4) An unprivileged process can reportedly bypass the RLIMIT_MEMLOCK soft resource limit and lock more memory than permitted via the "mlockall()" system call.

The vulnerability has been reported in versions 2.6.9 and 2.6.10.

Solution:
Grant only trusted users access to affected systems.


http://secunia.com/advisories
Printer Friendly | Permalink |  | Top
ret5hd Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jan-11-05 09:46 AM
Response to Original message
1. ahhh...open source community will have this fixed before the days out ...
if it isnt already, i'd bet.

and am i reading it correctly that it is limited to local users?

What damage can a local user do to ms boxes?
Printer Friendly | Permalink |  | Top
 
Nomad559 Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jan-11-05 10:40 AM
Response to Reply #1
5. Will have this fixed before the days out
I think a patch Is available, but I keep getting a Too many users In your class error.

?click
Printer Friendly | Permalink |  | Top
 
no name no slogan Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jan-11-05 09:56 AM
Response to Original message
2. The more I read about modern OSs, the more I like my Timex Sinclair 1000
Yours to take home for only $99.95, back in the day. And, with the addition of the 16k RAM pack, it was almost enough computing power to run your D&D games.



http://oldcomputers.net/byte-ts1000.html
Printer Friendly | Permalink |  | Top
 
Renew Deal Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jan-11-05 09:59 AM
Response to Reply #2
3. No OS is safe. Ever
Linux had more bugs the last couple of years than Windwos XP/2003. More bugs will be found as focus on it grows. Anyone that thinks that Linux isn't going to have the same issues that Windows has had, isn't thinking clearly.
Printer Friendly | Permalink |  | Top
 
DontBlameMe Donating Member (889 posts) Send PM | Profile | Ignore Tue Jan-11-05 10:04 AM
Response to Reply #2
4. At least you had push button keys. My TS2000 had...
that membrane crap.

But it was a good little machine for $99. Great chess program, too. Although, loading progs from tape...
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Thu Apr 25th 2024, 04:45 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » The DU Lounge Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC