[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1653 linux-2.6 -- denial of service/privilege escalation

ID: oval:org.mitre.oval:def:7921Date: (C)2009-12-15   (M)2024-02-19
Class: PATCHFamily: unix




Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation. The Common Vulnerabilities and Exposures project identifies the following problems: Joe Jin reported a local denial of service vulnerability that allows system users to trigger an oops due to an improperly initialized data structure. Jan Kratochvil reported a local denial of service vulnerability in the ptrace interface for the s390 architecture. Local users can trigger an invalid pointer dereference, leading to a system panic. Eugene Teo reported an integer overflow in the DCCP subsystem that may allow remote attackers to cause a denial of service in the form of a kernel panic. Eugene Teo reported a lack of capability checks in the kernel driver for Granch SBNI12 leased line adapters (sbni), allowing local users to perform privileged operations. The S_ISUID/S_ISGID bits were not being cleared during an inode splice, which, under certain conditions, can be exploited by local users to obtain the privileges of a group for which they are not a member. Mark Fasheh reported this issue. David Watson reported an issue in the open()/creat() system calls which, under certain conditions, can be exploited by local users to obtain the privileges of a group for which they are not a member. A coding error in the splice subsystem allows local users to attempt to unlock a page structure that has not been locked, resulting in a system crash.

Platform:
Debian 4.0
Product:
linux-2.6
Reference:
DSA-1653
CVE-2007-6716
CVE-2008-1514
CVE-2008-3276
CVE-2008-3525
CVE-2008-3833
CVE-2008-4210
CVE-2008-4302
CVE    7
CVE-2007-6716
CVE-2008-1514
CVE-2008-3525
CVE-2008-3833
...
CPE    1
cpe:/o:debian:debian_linux:4.x

© SecPod Technologies