SB2011050901 - Multiple vulnerabilities in Linux kernel



SB2011050901 - Multiple vulnerabilities in Linux kernel

Published: May 9, 2011 Updated: August 11, 2020

Security Bulletin ID SB2011050901
Severity
High
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 75% Medium 25%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Integer overflow (CVE-ID: CVE-2011-1745)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Integer overflow in the agp_generic_insert_memory function in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 allows local users to gain privileges or cause a denial of service (system crash) via a crafted AGPIOC_BIND agp_ioctl ioctl call.


2) Input validation error (CVE-ID: CVE-2011-1746)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Multiple integer overflows in the (1) agp_allocate_memory and (2) agp_create_user_memory functions in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 allow local users to trigger buffer overflows, and consequently cause a denial of service (system crash) or possibly have unspecified other impact, via vectors related to calls that specify a large number of memory pages.


3) Resource management error (CVE-ID: CVE-2011-1747)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The agp subsystem in the Linux kernel 2.6.38.5 and earlier does not properly restrict memory allocation by the (1) AGPIOC_RESERVE and (2) AGPIOC_ALLOCATE ioctls, which allows local users to cause a denial of service (memory consumption) by making many calls to these ioctls.


4) Input validation error (CVE-ID: CVE-2011-2022)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The agp_generic_remove_memory function in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 does not validate a certain start parameter, which allows local users to gain privileges or cause a denial of service (system crash) via a crafted AGPIOC_UNBIND agp_ioctl ioctl call, a different vulnerability than CVE-2011-1745.


Remediation

Install update from vendor's website.