Package: kernel-image-2.6.8-2-686-smp Version: 2.6.8-13 Severity: critical Tags: security Justification: breaks the whole system
kernel oops while trying to do a snmpwalk from a remote host. the entire udp stack becomes unresponsive and reboot fails when trying to bring down network interfaces. unsure if this is exploitable for a DoS attack, will investigate further when i have time if this not a know issue. 0000:01:01.0 Ethernet controller: Intel Corp. 82547GI Gigabit Ethernet Controller 0000:03:02.0 Ethernet controller: Intel Corp. 82541GI/PI Gigabit Ethernet Controller vlan tagging is in use on the interface that recieves the udp packet that causes the oops. Unable to handle kernel NULL pointer dereference at virtual address 00000000 printing eip: f89f64f2 *pde = 00000000 Oops: 0000 [#1] PREEMPT SMP Modules linked in: deflate zlib_deflate twofish serpent aes_i586 blowfish des sha256 sha1 crypto_null af_key tun ipv6 8021q dm_mod capability commoncap e1000 genrtc ext3 jbd mbcache sd_mod ata_piix libata scsi_mod unix font vesafb cfbcopyarea cfbimgblt cfbfillrect CPU: 1 EIP: 0060:[<f89f64f2>] Not tainted EFLAGS: 00010a86 (2.6.8-2-686-smp) EIP is at e1000_shift_out_mdi_bits+0x22/0xa0 [e1000] eax: ffffffff ebx: 80000000 ecx: 0000001f edx: 00000000 esi: f77f3c10 edi: f74bbe6c ebp: ffffffff esp: f74bbe64 ds: 007b es: 007b ss: 0068 Process snmpd (pid: 793, threadinfo=f74ba000 task=f505b410) Stack: c038b124 c01163e7 00000000 00001820 f77f3c10 f74bbee2 f74bbf30 f89f674b f77f3c10 ffffffff 00000020 f74bbecc f77f3a20 f74bbedc f89f3b3b f77f3c10 00000000 f74bbee2 f74bbecc f89f3950 f74bbedc f8880ab1 f77f3800 f74bbecc Call Trace: [<c01163e7>] smp_apic_timer_interrupt+0xe7/0x160 [<f89f674b>] e1000_read_phy_reg_ex+0xab/0xd0 [e1000] [<f89f3b3b>] e1000_mii_ioctl+0x1cb/0x1d0 [e1000] [<f89f3950>] e1000_ioctl+0x0/0x20 [e1000] [<f8880ab1>] vlan_dev_ioctl+0xc1/0x110 [8021q] [<c0236944>] dev_ifsioc+0x374/0x3e0 [<c0236b46>] dev_ioctl+0x196/0x320 [<c027f59c>] inet_ioctl+0x9c/0xb0 [<c022b9d9>] sock_ioctl+0x139/0x300 [<c0174d78>] sys_ioctl+0x148/0x2d0 [<c01061fb>] syscall_call+0x7/0xb Code: 8b 02 0d 00 00 00 03 89 44 24 08 85 db 74 56 eb 0d 90 90 90 -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.8-2-686-smp Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Versions of packages kernel-image-2.6.8-2-686-smp depends on: ii coreutils [fileutils] 5.2.1-2 The GNU core utilities ii fileutils 5.2.1-2 The GNU file management utilities ii initrd-tools 0.1.78 tools to create initrd image for p ii module-init-tools 3.2-pre1-2 tools for managing Linux kernel mo -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]