[<prev] [next>] [day] [month] [year] [list]
Message-ID: <45edc9c4.IYhEqeCF18XULrXH%announce-noreply@rpath.com>
Date: Tue, 06 Mar 2007 15:06:28 -0500
From: rPath Update Announcements <announce-noreply@...th.com>
To: security-announce@...ts.rpath.com, update-announce@...ts.rpath.com
Cc: lwn@....net, full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: rPSA-2007-0050-1 kernel
rPath Security Advisory: 2007-0050-1
Published: 2007-03-06
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
Local Deterministic Vulnerability
Updated Versions:
kernel=/conary.rpath.com@rpl:devel//1/2.6.19.7-0.1-1
References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5753
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0006
https://issues.rpath.com/browse/RPL-1097
https://issues.rpath.com/browse/RPL-1106
Description:
Previous versions of the kernel package are vulnerable to multiple
local user attacks.
One vulnerability is a local user denial of service (system crash)
due to a bug in the key_alloc_serial() function.
The second vulnerability is a local user attack in which a call to
the listxattr() system call on a bad inode will at least corrupt
memory in the calling process, and may allow a malicious program
to read protected kernel memory (information exposure, possibly
enabling other vulnerabilities), system crash, or even executing
arbitrary code provided by the attacker. Bad inodes are not present
on most systems, so in practice the attack will require that the
user be able to mount a filesystem.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists