Linux Kernel TmpFS Driver Local Denial Of Service Vulnerability
BID:12970
Info
Linux Kernel TmpFS Driver Local Denial Of Service Vulnerability
| Bugtraq ID: | 12970 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2005-0977 |
| Remote: | No |
| Local: | Yes |
| Published: | Apr 01 2005 12:00AM |
| Updated: | Jul 12 2009 11:56AM |
| Credit: | The vendor disclosed this vulnerability. |
| Vulnerable: |
Ubuntu Ubuntu Linux 4.1 ppc Ubuntu Ubuntu Linux 4.1 ia64 Ubuntu Ubuntu Linux 4.1 ia32 Redhat Enterprise Linux WS 4 Redhat Enterprise Linux ES 4 Redhat Enterprise Linux AS 4 Redhat Desktop 4.0 Linux kernel 2.6.11 .6 Linux kernel 2.6.11 .5 Linux kernel 2.6.11 -rc4 Linux kernel 2.6.11 -rc3 Linux kernel 2.6.11 -rc2 Linux kernel 2.6.11 Linux kernel 2.6.10 rc2 Linux kernel 2.6.10 Linux kernel 2.6.9 Linux kernel 2.6.8 rc3 Linux kernel 2.6.8 rc2 Linux kernel 2.6.8 rc1 Linux kernel 2.6.8 Linux kernel 2.6.7 rc1 Linux kernel 2.6.7 Linux kernel 2.6.6 rc1 Linux kernel 2.6.6 Linux kernel 2.6.5 Linux kernel 2.6.4 Linux kernel 2.6.3 Linux kernel 2.6.2 Linux kernel 2.6.1 -rc2 Linux kernel 2.6.1 -rc1 Linux kernel 2.6.1 Linux kernel 2.6 .10 Linux kernel 2.6 -test9-CVS Linux kernel 2.6 -test9 Linux kernel 2.6 -test8 Linux kernel 2.6 -test7 Linux kernel 2.6 -test6 Linux kernel 2.6 -test5 Linux kernel 2.6 -test4 Linux kernel 2.6 -test3 Linux kernel 2.6 -test2 Linux kernel 2.6 -test11 Linux kernel 2.6 -test10 Linux kernel 2.6 -test1 Linux kernel 2.6 Linux kernel 2.4.30 rc3 Linux kernel 2.4.30 rc2 Linux kernel 2.4.29 -rc2 Linux kernel 2.4.29 -rc1 Linux kernel 2.4.29 Linux kernel 2.4.28 Linux kernel 2.4.27 -pre5 Linux kernel 2.4.27 -pre4 Linux kernel 2.4.27 -pre3 Linux kernel 2.4.27 -pre2 Linux kernel 2.4.27 -pre1 Linux kernel 2.4.27 Linux kernel 2.4.26 Linux kernel 2.4.25 Linux kernel 2.4.24 -ow1 Linux kernel 2.4.24 Linux kernel 2.4.23 -pre9 Linux kernel 2.4.23 -ow2 Linux kernel 2.4.23 Linux kernel 2.4.22 Linux kernel 2.4.21 pre7 Linux kernel 2.4.21 pre4 Linux kernel 2.4.21 pre1 Linux kernel 2.4.21 Linux kernel 2.4.20 Linux kernel 2.4.19 -pre6 Linux kernel 2.4.19 -pre5 Linux kernel 2.4.19 -pre4 Linux kernel 2.4.19 -pre3 Linux kernel 2.4.19 -pre2 Linux kernel 2.4.19 -pre1 Linux kernel 2.4.19 Linux kernel 2.4.18 pre-8 Linux kernel 2.4.18 pre-7 Linux kernel 2.4.18 pre-6 Linux kernel 2.4.18 pre-5 Linux kernel 2.4.18 pre-4 Linux kernel 2.4.18 pre-3 Linux kernel 2.4.18 pre-2 Linux kernel 2.4.18 pre-1 Linux kernel 2.4.18 x86 Linux kernel 2.4.18 Linux kernel 2.4.17 Linux kernel 2.4.16 Linux kernel 2.4.15 Linux kernel 2.4.14 Linux kernel 2.4.13 Linux kernel 2.4.12 Linux kernel 2.4.11 Linux kernel 2.4.10 Linux kernel 2.4.9 Linux kernel 2.4.8 Linux kernel 2.4.7 Linux kernel 2.4.6 Linux kernel 2.4.5 Linux kernel 2.4.4 Linux kernel 2.4.3 Linux kernel 2.4.2 Linux kernel 2.4.1 Linux kernel 2.4 .0-test9 Linux kernel 2.4 .0-test8 Linux kernel 2.4 .0-test7 Linux kernel 2.4 .0-test6 Linux kernel 2.4 .0-test5 Linux kernel 2.4 .0-test4 Linux kernel 2.4 .0-test3 Linux kernel 2.4 .0-test2 Linux kernel 2.4 .0-test12 Linux kernel 2.4 .0-test11 Linux kernel 2.4 .0-test10 Linux kernel 2.4 .0-test1 Linux kernel 2.4 |
| Not Vulnerable: | |
Discussion
Linux Kernel TmpFS Driver Local Denial Of Service Vulnerability
The Linux kernel is reported prone to a local denial of service vulnerability. The issue is reported to exist in the Linux kernel tmpfs driver, and is because of a lack of sanitization performed on the address argument of 'shm_nopage()'.
The Linux kernel is reported prone to a local denial of service vulnerability. The issue is reported to exist in the Linux kernel tmpfs driver, and is because of a lack of sanitization performed on the address argument of 'shm_nopage()'.
Exploit / POC
Linux Kernel TmpFS Driver Local Denial Of Service Vulnerability
Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Solution / Fix
Linux Kernel TmpFS Driver Local Denial Of Service Vulnerability
Solution:
The vendor has released a patch to address this issue; it is available at the following location:
http://www.securityfocus.com/data/vulnerabilities/patches/shmem.patch
Ubuntu has released an advisory (USN-103-1) and fixes to address this issue and other Linux Kernel vulnerabilities. Customers are advised to peruse the referenced advisory to obtain further information in regards to obtaining and applying an appropriate update.
RedHat has released advisory RHSA-2005:366-19 to address this, and other issues in RedHat Enterprise Linux 4, and RedHat Desktop 4 operating systems. Please see the referenced advisory for further information.
Linux kernel 2.6.8 rc1
Solution:
The vendor has released a patch to address this issue; it is available at the following location:
http://www.securityfocus.com/data/vulnerabilities/patches/shmem.patch
Ubuntu has released an advisory (USN-103-1) and fixes to address this issue and other Linux Kernel vulnerabilities. Customers are advised to peruse the referenced advisory to obtain further information in regards to obtaining and applying an appropriate update.
RedHat has released advisory RHSA-2005:366-19 to address this, and other issues in RedHat Enterprise Linux 4, and RedHat Desktop 4 operating systems. Please see the referenced advisory for further information.
Linux kernel 2.6.8 rc1
-
Ubuntu linux-doc-2.6.8.1_2.6.8.1-16.13_all.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-doc-2.6.8.1_2.6.8.1-16.13_all.deb -
Ubuntu linux-headers-2.6.8.1-5-386_2.6.8.1-16.13_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-386_2.6.8.1-16.13_i386.deb -
Ubuntu linux-headers-2.6.8.1-5-686-smp_2.6.8.1-16.13_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-686-smp_2.6.8.1-16.13_i386.deb -
Ubuntu linux-headers-2.6.8.1-5-686_2.6.8.1-16.13_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-686_2.6.8.1-16.13_i386.deb -
Ubuntu linux-headers-2.6.8.1-5-amd64-generic_2.6.8.1-16.13_amd64.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-amd64-generic_2.6.8.1-16.13_amd64.deb -
Ubuntu linux-headers-2.6.8.1-5-amd64-k8-smp_2.6.8.1-16.13_amd64.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-amd64-k8-smp_2.6.8.1-16.13_amd64.deb -
Ubuntu linux-headers-2.6.8.1-5-amd64-k8_2.6.8.1-16.13_amd64.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-amd64-k8_2.6.8.1-16.13_amd64.deb -
Ubuntu linux-headers-2.6.8.1-5-amd64-xeon_2.6.8.1-16.13_amd64.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-amd64-xeon_2.6.8.1-16.13_amd64.deb -
Ubuntu linux-headers-2.6.8.1-5-k7-smp_2.6.8.1-16.13_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-k7-smp_2.6.8.1-16.13_i386.deb -
Ubuntu linux-headers-2.6.8.1-5-k7_2.6.8.1-16.13_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-k7_2.6.8.1-16.13_i386.deb -
Ubuntu linux-headers-2.6.8.1-5-power3-smp_2.6.8.1-16.13_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-power3-smp_2.6.8.1-16.13_powerpc.deb -
Ubuntu linux-headers-2.6.8.1-5-power3_2.6.8.1-16.13_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-power3_2.6.8.1-16.13_powerpc.deb -
Ubuntu linux-headers-2.6.8.1-5-power4-smp_2.6.8.1-16.13_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-power4-smp_2.6.8.1-16.13_powerpc.deb -
Ubuntu linux-headers-2.6.8.1-5-power4_2.6.8.1-16.13_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-power4_2.6.8.1-16.13_powerpc.deb -
Ubuntu linux-headers-2.6.8.1-5-powerpc-smp_2.6.8.1-16.13_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-powerpc-smp_2.6.8.1-16.13_powerpc.deb -
Ubuntu linux-headers-2.6.8.1-5-powerpc_2.6.8.1-16.13_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-powerpc_2.6.8.1-16.13_powerpc.deb -
Ubuntu linux-headers-2.6.8.1-5_2.6.8.1-16.13_amd64.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5_2.6.8.1-16.13_amd64.deb -
Ubuntu linux-headers-2.6.8.1-5_2.6.8.1-16.13_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5_2.6.8.1-16.13_i386.deb -
Ubuntu linux-headers-2.6.8.1-5_2.6.8.1-16.13_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5_2.6.8.1-16.13_powerpc.deb -
Ubuntu linux-image-2.6.8.1-5-386_2.6.8.1-16.13_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-386_2.6.8.1-16.13_i386.deb -
Ubuntu linux-image-2.6.8.1-5-686-smp_2.6.8.1-16.13_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-686-smp_2.6.8.1-16.13_i386.deb -
Ubuntu linux-image-2.6.8.1-5-686_2.6.8.1-16.13_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-686_2.6.8.1-16.13_i386.deb -
Ubuntu linux-image-2.6.8.1-5-amd64-generic_2.6.8.1-16.13_amd64.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-amd64-generic_2.6.8.1-16.13_amd64.deb -
Ubuntu linux-image-2.6.8.1-5-amd64-k8-smp_2.6.8.1-16.13_amd64.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-amd64-k8-smp_2.6.8.1-16.13_amd64.deb -
Ubuntu linux-image-2.6.8.1-5-amd64-k8_2.6.8.1-16.13_amd64.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-amd64-k8_2.6.8.1-16.13_amd64.deb -
Ubuntu linux-image-2.6.8.1-5-amd64-xeon_2.6.8.1-16.13_amd64.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-amd64-xeon_2.6.8.1-16.13_amd64.deb -
Ubuntu linux-image-2.6.8.1-5-k7-smp_2.6.8.1-16.13_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-k7-smp_2.6.8.1-16.13_i386.deb -
Ubuntu linux-image-2.6.8.1-5-k7_2.6.8.1-16.13_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-k7_2.6.8.1-16.13_i386.deb -
Ubuntu linux-image-2.6.8.1-5-power3-smp_2.6.8.1-16.13_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-power3-smp_2.6.8.1-16.13_powerpc.deb -
Ubuntu linux-image-2.6.8.1-5-power3_2.6.8.1-16.13_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-power3_2.6.8.1-16.13_powerpc.deb -
Ubuntu linux-image-2.6.8.1-5-power4-smp_2.6.8.1-16.13_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-power4-smp_2.6.8.1-16.13_powerpc.deb -
Ubuntu linux-image-2.6.8.1-5-power4_2.6.8.1-16.13_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-power4_2.6.8.1-16.13_powerpc.deb -
Ubuntu linux-image-2.6.8.1-5-powerpc-smp_2.6.8.1-16.13_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-powerpc-smp_2.6.8.1-16.13_powerpc.deb -
Ubuntu linux-image-2.6.8.1-5-powerpc_2.6.8.1-16.13_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-powerpc_2.6.8.1-16.13_powerpc.deb -
Ubuntu linux-patch-debian-2.6.8.1_2.6.8.1-16.13_all.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-patch-debian-2.6.8.1_2.6.8.1-16.13_all.deb -
Ubuntu linux-source-2.6.8.1_2.6.8.1-16.13_all.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-source-2.6.8.1_2.6.8.1-16.13_all.deb -
Ubuntu linux-tree-2.6.8.1_2.6.8.1-16.13_all.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-tree-2.6.8.1_2.6.8.1-16.13_all.deb
References
Linux Kernel TmpFS Driver Local Denial Of Service Vulnerability
References:
References:
- [PATCH] tmpfs caused truncate BUG (Linux Kernel)
- RHSA-2005:366-19 - kernel security update (RedHat)