ПРОЕКТЫ 


  АРХИВ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  СТАТЬИ 


  ПЕРСОНАЛЬНОЕ 


  ПРОГРАММЫ 



ПИШИТЕ
ПИСЬМА














     АРХИВ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: [SA25594] Linux Kernel Multiple Vulnerabilities



> 
> TITLE:
> Linux Kernel Multiple Vulnerabilities
> 
> SECUNIA ADVISORY ID:
> SA25594
> 
> VERIFY ADVISORY:
> http://secunia.com/advisories/25594/
> 
> CRITICAL:
> Moderately critical
> 
> IMPACT:
> Brute force, Exposure of sensitive information, DoS
> 
> WHERE:
> From remote
> 
> OPERATING SYSTEM:
> Linux Kernel 2.6.x
> http://secunia.com/product/2719/
> 
> DESCRIPTION:
> Two vulnerabilities and a weakness have been reported in the Linux
> Kernel, which can be exploited by malicious, local users to disclose
> potentially sensitive information and malicious people to cause a DoS
> (Denial of Service).
> 
> 1) A NULL-pointer dereference exists within netfilter when handling
> new SCTP connections with unknown chunk types. This can be exploited
> to crash the kernel by sending malicious packets.
> 
> 2) An underflow error within the "cpuset_task_read()" function in
> /kernel/cpuset.c can be exploited to read kernel memory, which may
> contain potentially sensitive information.
> 
> 3) The kernel does not handle seeds for the random number generator
> correctly. This may weaken the security of applications relying on
> the randomness of the kernel random number generator.
> 
> SOLUTION:
> Update to version 2.6.21.4.
> 
> PROVIDED AND/OR DISCOVERED BY:
> 1) Vilmos Nebehaj
> 2, 3) Reported by the vendor.
> 
> ORIGINAL ADVISORY:
> http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4
> 



 




Copyright © Lexa Software, 1996-2009.