Tuesday, November 01, 2005

Linux Kernel Potential Buffer Overflow Vulnerabilities

Via Secunia.

Secunia Advisory: SA17384
Release Date: 2005-11-01
Critical: Not critical
Impact: Unknown
Where: Local system
Solution Status: Vendor Patch

OS: Linux Kernel 2.6.x


Description:
Two vulnerabilities have been reported in the Linux Kernel, with an unknown impact.

1) A boundary error due to missing parameter validation in the "map_to_seg7()" function in "drivers/usb/input/map_to_7segment.h" of the Yealink driver may cause out-of-bound memory references.

2) A boundary error in "/drivers/i2c/i2c-core.c" when handling SMBus Block Write transactions may cause a buffer overflow.

Solution:
The vulnerabilities have been fixed in version 2.6.14-git4.

Provided and/or discovered by:
Reported by vendor.

Original Advisory:
Kernel.org:
http://www.kernel.org/git/?p=lin...b817532965d18b792d6d74afecfb0bcf
http://www.kernel.org/git/?p=lin...5981537ff3b8df6433951de6c9cb72cb
http://www.kernel.org/pub/linux/.../snapshots/patch-2.6.14-git4.log

0 Comments:

Post a Comment

<< Home