SB2004123107 - Integer overflow in Linux kernel
Published: December 31, 2004
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Integer overflow (CVE-ID: CVE-2004-2731)
The vulnerability allows a local user to read and manipulate data.
Multiple integer overflows in Sbus PROM driver (drivers/sbus/char/openprom.c) for the Linux kernel 2.4.x up to 2.4.27, 2.6.x up to 2.6.7, and possibly later versions, allow local users to execute arbitrary code by specifying (1) a small buffer size to the copyin_string function or (2) a negative buffer size to the copyin function.
Remediation
Install update from vendor's website.
References
- http://archives.neohapsis.com/archives/bugtraq/2004-06/0463.html
- http://secunia.com/advisories/11981
- http://secunia.com/advisories/29058
- http://securitytracker.com/id?1010617
- http://www.debian.org/security/2008/dsa-1503
- http://www.osvdb.org/7345
- http://www.osvdb.org/8363
- http://www.securiteam.com/unixfocus/5GP0515DFW.html
- http://www.securityfocus.com/bid/10632