[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

USN-714-1 -- Linux kernel vulnerabilities

ID: oval:org.secpod.oval:def:700450Date: (C)2011-05-13   (M)2024-02-19
Class: PATCHFamily: unix




Hugo Dias discovered that the ATM subsystem did not correctly manage socket counts. A local attacker could exploit this to cause a system hang, leading to a denial of service. It was discovered that the libertas wireless driver did not correctly handle beacon and probe responses. A physically near-by attacker could generate specially crafted wireless network traffic and cause a denial of service. Ubuntu 6.06 was not affected. It was discovered that the inotify subsystem contained watch removal race conditions. A local attacker could exploit this to crash the system, leading to a denial of service. Dann Frazier discovered that in certain situations sendmsg did not correctly release allocated memory. A local attacker could exploit this to force the system to run out of free memory, leading to a denial of service. Ubuntu 6.06 was not affected. It was discovered that the ATA subsystem did not correctly set timeouts. A local attacker could exploit this to cause a system hang, leading to a denial of service. It was discovered that the ib700 watchdog timer did not correctly check buffer sizes. A local attacker could send a specially crafted ioctl to the device to cause a system crash, leading to a denial of service. It was discovered that in certain situations the network scheduler did not correctly handle very large levels of traffic. A local attacker could produce a high volume of UDP traffic resulting in a system hang, leading to a denial of service. Ubuntu 8.04 was not affected

Platform:
Ubuntu 7.10
Ubuntu 8.04
Ubuntu 6.06
Product:
Linux
Reference:
USN-714-1
CVE-2008-5079
CVE-2008-5134
CVE-2008-5182
CVE-2008-5300
CVE-2008-5700
CVE-2008-5702
CVE-2008-5713
CVE    7
CVE-2008-5079
CVE-2008-5134
CVE-2008-5300
CVE-2008-5700
...
CPE    3
cpe:/o:ubuntu:ubuntu_linux:8.04
cpe:/o:ubuntu:ubuntu_linux:7.10
cpe:/o:ubuntu:ubuntu_linux:6.06

© SecPod Technologies