[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1565 linux-2.6 -- several vulnerabilities

ID: oval:org.mitre.oval:def:7816Date: (C)2009-12-15   (M)2023-11-09
Class: PATCHFamily: unix




Several local vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems: Cyrill Gorcunov reported a NULL pointer dereference in code specific to the CHRP PowerPC platforms. Local users could exploit this issue to achieve a Denial of Service (DoS). Nick Piggin of SuSE discovered a number of issues in subsystems which register a fault handler for memory mapped areas. This issue can be exploited by local users to achieve a Denial of Service (DoS) and possibly execute arbitrary code. David Peer discovered that users could escape administrator imposed cpu time limitations (RLIMIT_CPU) by setting a limit of 0. Alexander Viro discovered a race condition in the directory notification subsystem that allows local users to cause a Denial of Service (oops) and possibly result in an escalation of privileges.

Platform:
Debian 4.0
Product:
linux-2.6
Reference:
DSA-1565
CVE-2007-6694
CVE-2008-0007
CVE-2008-1294
CVE-2008-1375
CVE    4
CVE-2007-6694
CVE-2008-1375
CVE-2008-1294
CVE-2008-0007
...
CPE    1
cpe:/o:debian:debian_linux:4.x

© SecPod Technologies