TITLE: Linux Kernel Multiple Vulnerabilities SECUNIA ADVISORY ID: SA13572 VERIFY ADVISORY: http://secunia.com/advisories/13572/ CRITICAL: Less critical IMPACT: Exposure of sensitive information, DoS WHERE: Local system OPERATING SYSTEM: Linux Kernel 2.6.x http://secunia.com/product/2719/ DESCRIPTION: Multiple vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain knowledge of potentially sensitive information. 1) A NULL pointer dereference error in the "aio_free_ring()" system call can be exploited to crash the system by mapping out as much of the process address space as possible and then call the "io_setup()" function with an extremely large value (about 65000) in the "nr_events" argument. The vulnerability has been reported in version 2.6.9. Other versions may also be affected. 2) An error in the DRM (Direct Rendering Manager) drivers due to insufficient DMA lock checking can be exploited to crash the X server or modify video output. 3) A race condition within the handling of "/proc/.../cmdline" may disclose the content of environment variables of spawning processes. SOLUTION: Secunia is currently not aware of an updated version, which fixes the vulnerabilities. Grant only trusted users access to affected systems. PROVIDED AND/OR DISCOVERED BY: 1) Darrick J. Wong 2) Thomas Hellström 3) Rob Landley ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------