Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 127162 - Linux Kernel Netfilter do_replace() Local Buffer Overflow Vulnerability (CVE-2006-0038)
Summary: Linux Kernel Netfilter do_replace() Local Buffer Overflow Vulnerability (CVE-...
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: High major (vote)
Assignee: Gentoo Security
URL: http://www.securityfocus.com/bid/1717...
Whiteboard:
Keywords:
: 127216 (view as bug list)
Depends on:
Blocks:
 
Reported: 2006-03-22 02:13 UTC by Christian Bricart
Modified: 2006-04-17 06:41 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Christian Bricart 2006-03-22 02:13:11 UTC
Quoting SecurityFocus:

The Linux kernel is susceptible to a remote buffer-overflow vulnerability. This issue is due to the kernel's failure to properly bounds-check user-supplied input before using it in a memory copy operation.

This issue allows remote attackers to overwrite kernel memory with arbitrary data, potentially allowing them to execute malicious machine code in the context of affected kernels. This vulnerability facilitates the complete compromise of affected computers.

Linux kernel versions prior to 2.6.16 in the 2.6 series are affected by this issue.
Comment 1 Christian Bricart 2006-03-22 03:36:51 UTC
Harald Welte (netfilter core team) commented on this:
http://www.mail-archive.com/netfilter-announce@lists.netfilter.org/msg00059.html

It seems that the bug is NOT remote exploitable.
So I removed "remote" from summary and decreased serverity to "major"
Comment 2 Tim Yamin (RETIRED) gentoo-dev 2006-03-27 13:16:04 UTC
This might affect openvz-sources/vserver-sources; maintainers please confirm... No security risk otherwise.
Comment 3 Tim Yamin (RETIRED) gentoo-dev 2006-03-27 13:28:39 UTC
*** Bug 127216 has been marked as a duplicate of this bug. ***
Comment 4 Benedikt Böhm (RETIRED) gentoo-dev 2006-03-29 07:02:24 UTC
regarding vserver only those guests with CAP_NET_ADMIN might be affected which is off by default.

regarding openvz as per upstream it is not an issue
Comment 5 Tim Yamin (RETIRED) gentoo-dev 2006-04-15 13:14:02 UTC
@hollow: Understood, can you please patch the 2.6.15 series for this issue? Or possibly send the 2.6.16 series to stable.

Thanks!
Comment 6 Tim Yamin (RETIRED) gentoo-dev 2006-04-16 10:59:07 UTC
Upon further inspection with phreak, vserver is not affected by this (they implement the code themselves differently).
Comment 7 Benedikt Böhm (RETIRED) gentoo-dev 2006-04-16 19:15:54 UTC
ok, good, since the 2.6.16 version will still take some time i'm afraid..
Comment 8 Tim Yamin (RETIRED) gentoo-dev 2006-04-17 06:41:48 UTC
openvz also not affected, so this bug can be closed :)