Debian: DSA-2303-1: linux-2.6 security update

    Date08 Sep 2011
    CategoryDebian
    93
    Posted ByLinuxSecurity Advisories
    Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation. The Common Vulnerabilities and Exposures project identifies the following problems:
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - ----------------------------------------------------------------------
    Debian Security Advisory DSA-2303-1                This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/       Moritz Muehlenhoff, Dann Frazier
    September 8, 2011                   http://www.debian.org/security/faq
    - ----------------------------------------------------------------------
    
    Package        : linux-2.6
    Vulnerability  : privilege escalation/denial of service/information leak
    Problem type   : local/remote
    Debian-specific: no
    CVE Id(s)      : CVE-2011-1020 CVE-2011-1576 CVE-2011-2484 CVE-2011-2491
                     CVE-2011-2492 CVE-2011-2495 CVE-2011-2496 CVE-2011-2497
                     CVE-2011-2517 CVE-2011-2525 CVE-2011-2700 CVE-2011-2723
                     CVE-2011-2905 CVE-2011-2909 CVE-2011-2918 CVE-2011-2928
                     CVE-2011-3188 CVE-2011-3191
    
    Several vulnerabilities have been discovered in the Linux kernel that may lead
    to a denial of service or privilege escalation. The Common Vulnerabilities and
    Exposures project identifies the following problems:
    
    CVE-2011-1020 
    
        Kees Cook discovered an issue in the /proc filesystem that allows local
        users to gain access to sensitive process information after execution of a
        setuid binary.
    
    CVE-2011-1576 
    
        Ryan Sweat discovered an issue in the VLAN implementation. Local users may
        be able to cause a kernel memory leak, resulting in a denial of service.
    
    CVE-2011-2484 
    
        Vasiliy Kulikov of Openwall discovered that the number of exit handlers that
        a process can register is not capped, resulting in local denial of service
        through resource exhaustion (cpu time and memory).
    
    CVE-2011-2491
    
        Vasily Averin discovered an issue with the NFS locking implementation.  A
        malicious NFS server can cause a client to hang indefinitely in an unlock
        call.
    
    CVE-2011-2492 
    
        Marek Kroemeke and Filip Palian discovered that uninitialized struct
        elements in the Bluetooth subsystem could lead to a leak of sensitive kernel
        memory through leaked stack memory.
    
    CVE-2011-2495 
    
        Vasiliy Kulikov of Openwall discovered that the io file of a process' proc
        directory was world-readable, resulting in local information disclosure of
        information such as password lengths.
    
    CVE-2011-2496 
    
        Robert Swiecki discovered that mremap() could be abused for local denial of
        service by triggering a BUG_ON assert.
    
    CVE-2011-2497
    
        Dan Rosenberg discovered an integer underflow in the Bluetooth subsystem,
        which could lead to denial of service or privilege escalation.
    
    CVE-2011-2517 
    
        It was discovered that the netlink-based wireless configuration interface
        performed insufficient length validation when parsing SSIDs, resulting in
        buffer overflows. Local users with the CAP_NET_ADMIN capability can cause a
        denial of service.
    
    CVE-2011-2525 
    
        Ben Pfaff reported an issue in the network scheduling code. A local user
        could cause a denial of service (NULL pointer dereference) by sending a
        specially crafted netlink message.
    
    CVE-2011-2700 
    
        Mauro Carvalho Chehab of Red Hat reported a buffer overflow issue in the
        driver for the Si4713 FM Radio Transmitter driver used by N900 devices.
        Local users could exploit this issue to cause a denial of service or
        potentially gain elevated privileges.
    
    CVE-2011-2723
    
        Brent Meshier reported an issue in the GRO (generic receive offload)
        implementation. This can be exploited by remote users to create a denial of
        service (system crash) in certain network device configurations.
    
    CVE-2011-2905 
    
        Christian Ohm discovered that the 'perf' analysis tool searches for its
        config files in the current working directory. This could lead to denial of
        service or potential privilege escalation if a user with elevated privileges
        is tricked into running 'perf' in a directory under the control of the
        attacker.
    
    CVE-2011-2909 
    
        Vasiliy Kulikov of Openwall discovered that a programming error in
        the Comedi driver could lead to the information disclosure through 
        leaked stack memory.
    
    CVE-2011-2918 
    
        Vince Weaver discovered that incorrect handling of software event overflows
        in the 'perf' analysis tool could lead to local denial of service.
    
    CVE-2011-2928
    
        Timo Warns discovered that insufficient validation of Be filesystem images
        could lead to local denial of service if a malformed filesystem image is
        mounted.
    
    CVE-2011-3188 
    
        Dan Kaminsky reported a weakness of the sequence number generation in the
        TCP protocol implementation. This can be used by remote attackers to inject
        packets into an active session.
    
    CVE-2011-3191
    
        Darren Lavender reported an issue in the Common Internet File System (CIFS).
        A malicious file server could cause memory corruption leading to a denial of
        service.
    
    This update also includes a fix for a regression introduced with the previous
    security fix for CVE-2011-1768 (Debian: #633738)
    
    For the stable distribution (squeeze), this problem has been fixed in version
    2.6.32-35squeeze1. Updates for issues impacting the oldstable distribution
    (lenny) will be available soon.
    
    The following matrix lists additional source packages that were rebuilt for
    compatibility with or to take advantage of this update:
    
                                                 Debian 6.0 (squeeze)
         user-mode-linux                         2.6.32-1um-4+35squeeze1
    
    We recommend that you upgrade your linux-2.6 and user-mode-linux packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"39","type":"x","order":"1","pct":50.65,"resources":[]},{"id":"88","title":"Should be more technical","votes":"11","type":"x","order":"2","pct":14.29,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"27","type":"x","order":"3","pct":35.06,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.