Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 138617 - Kernel: Linux-2.4.32 vulnerabilities (CVE-2006-{1857,1858})
Summary: Kernel: Linux-2.4.32 vulnerabilities (CVE-2006-{1857,1858})
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: Highest normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard: [linux <2.4.33]
Keywords:
Depends on:
Blocks:
 
Reported: 2006-06-30 12:01 UTC by Gustavo Zacarias (RETIRED)
Modified: 2009-07-13 18:45 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
CVE-2006-0039 split patch for 2.4.32 (CVE-2006-0039.patch,1.45 KB, patch)
2006-06-30 12:02 UTC, Gustavo Zacarias (RETIRED)
no flags Details | Diff
CVE-2006-1857 split patch for 2.4.32 (CVE-2006-1857.patch,631 bytes, patch)
2006-06-30 12:02 UTC, Gustavo Zacarias (RETIRED)
no flags Details | Diff
CVE-2006-1858 split patch for 2.4.32 (CVE-2006-1858.patch,1.36 KB, patch)
2006-06-30 12:03 UTC, Gustavo Zacarias (RETIRED)
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Gustavo Zacarias (RETIRED) gentoo-dev 2006-06-30 12:01:53 UTC
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0039
Race condition in the do_add_counters function in netfilter for Linux kernel 2.6.16 allows local users with CAP_NET_ADMIN capabilities to read kernel memory by triggering the race condition in a way that produces a size value that is inconsistent with allocated memory, which leads to a buffer over-read in IPT_ENTRY_ITERATE.

http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1857
Buffer overflow in SCTP in Linux kernel before 2.6.16.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a malformed HB-ACK chunk.

http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1858
SCTP in Linux kernel before 2.6.16.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a chunk length that is inconsistent with the actual length of provided parameters.

This are fixed in 2.4.33-rc2.
Comment 1 Gustavo Zacarias (RETIRED) gentoo-dev 2006-06-30 12:02:24 UTC
Created attachment 90545 [details, diff]
CVE-2006-0039 split patch for 2.4.32
Comment 2 Gustavo Zacarias (RETIRED) gentoo-dev 2006-06-30 12:02:45 UTC
Created attachment 90546 [details, diff]
CVE-2006-1857 split patch for 2.4.32
Comment 3 Gustavo Zacarias (RETIRED) gentoo-dev 2006-06-30 12:03:08 UTC
Created attachment 90547 [details, diff]
CVE-2006-1858 split patch for 2.4.32
Comment 4 Gustavo Zacarias (RETIRED) gentoo-dev 2006-06-30 12:04:20 UTC
Patches split from the incremental 2.4.33-rc1 -> 2.4.33-rc2 patch from kernel.org
sparc-sources-2.4.32-r6 will go in soon with the fixes, probably gentoo-sources & hardened-sources need to fix as well.
Comment 5 solar (RETIRED) gentoo-dev 2006-06-30 16:42:59 UTC
hardened-sources-2.4.32-r6 in portage with these 3 new patches plus one additional 
patch for sysctl controlable grsecurity resource logging I whiped up last night.
Marked older h-s-r4 stable.

Thank you Gustavo for pointing these patches out.
Comment 6 Tim Yamin (RETIRED) gentoo-dev 2006-07-02 08:21:11 UTC
gentoo-sources-2.4.32-r6 now in the tree with the patches, thanks Gustavo.

Maintainers: Please bump your sources to 2.4.33-rc2 or include security patches from the genpatches patchset.

CCing:
openmosix-sources: cluster, voxus
rsbac-sources: kang
xbox-sources: chrb, gimli
Comment 7 Gustavo Zacarias (RETIRED) gentoo-dev 2006-07-03 18:25:50 UTC
sparc-sources-2.4.32-r6 stable.
Comment 8 Tim Yamin (RETIRED) gentoo-dev 2006-08-07 14:12:39 UTC
openmosix-sources, rsbac-sources, xbox-sources-2.4: Security masked.
Comment 9 Harlan Lieberman-Berg (RETIRED) gentoo-dev 2006-10-26 10:42:08 UTC
Openmosix, RSBAC, Xbox 2.4 you are still vulnerable.
Comment 10 Harlan Lieberman-Berg (RETIRED) gentoo-dev 2006-11-01 18:58:46 UTC
RSBAC and OpenMOSIX are still vulnerable, as far as I can tell.  Kang, Tantive, please fix.  Xbox-2.4 is hardmasked for security packages. I'll wait three days and then assign those to treecleaners, unless there are objections.
Comment 11 Daniel Drake (RETIRED) gentoo-dev 2006-11-01 19:34:27 UTC
Assign what to treecleaners?
Comment 12 Daniel Drake (RETIRED) gentoo-dev 2006-11-01 19:37:27 UTC
Also, not entirely sure why you added kernel@, none of the mentioned kernels are maintained by the kernel herd
Comment 13 Harlan Lieberman-Berg (RETIRED) gentoo-dev 2006-11-02 08:22:25 UTC
Whoops, the kernel@ CC was an accident. I meant to add it to another bug. Assign xbox-sources-2.4.32-r1 to Treecleaners.
Comment 14 Guillaume Destuynder (RETIRED) gentoo-dev 2006-11-20 06:02:32 UTC
(In reply to comment #10)
> RSBAC and OpenMOSIX are still vulnerable, as far as I can tell.  Kang, Tantive,
> please fix.  Xbox-2.4 is hardmasked for security packages. I'll wait three days
> and then assign those to treecleaners, unless there are objections.
> 

not sure how old that is but since its re-opened with no reply:
there is no 2.4 rsbac kernel, patches for rsbac are in sys-kernel/hardened (the 2.4 one only)
Comment 15 Harlan Lieberman-Berg (RETIRED) gentoo-dev 2006-12-21 14:01:37 UTC
Looks fixed to me. Closing.
Comment 16 Bjoern Tropf (RETIRED) gentoo-dev 2009-07-13 18:45:14 UTC
Duplicate:
(CVE-2006-0039) http://bugs.gentoo.org/show_bug.cgi?id=133465