Rapid7 Vulnerability & Exploit Database

SUSE-SA:2004:028: kernel

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

SUSE-SA:2004:028: kernel

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:C)
Published
09/01/2004
Created
07/25/2018
Added
11/08/2005
Modified
11/18/2015

Description

Various signedness issues and integer overflows have been fixed within kNFSd and the XDR decode functions of kernel 2.6. These bugs can be triggered remotely by sending a package with a trusted source IP address and a write request with a size greater then 2^31. The result will be a kernel Oops, it is unknown if this bug is otherwise exploitable yet. Kernel 2.4 nfsd code is different but may suffer from the same vulnerability. Additionally a local denial-of-service condition via /dev/ptmx, which affects kernel 2.6 only has been fixed. Thanks to Jan Engelhardt for reporting this issue to us.

This update also fixes several non security bugs, including:

  • CD and DVD writing of non-data media was leaking huge amounts kernel memory.
  • Fixed barrier issues on some IDE devices. "barrier=none" should not be needed anymore.

Solution(s)

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;