[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2008:167 -- Mandriva kernel

ID: oval:org.secpod.oval:def:301293Date: (C)2012-01-07   (M)2023-11-13
Class: PATCHFamily: unix




Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel: Memory leak in the ipip6_rcv function in net/ipv6/sit.c in the Linux kernel before 2.6.25.3 allows remote attackers to cause a denial of service via network traffic to a Simple Internet Transition tunnel interface, related to the pskb_may_pull and kfree_skb functions, and management of an skb reference count. The utimensat system call in Linux kernel 2.6.22 and other versions before 2.6.25.3 does not check file permissions when certain UTIME_NOW and UTIME_OMIT combinations are used, which allows local users to modify file times of arbitrary files, possibly leading to a denial of service. Integer overflow in the dccp_feat_change function in net/dccp/feat.c in the Datagram Congestion Control Protocol subsystem in the Linux kernel 2.6.18, and 2.6.17 through 2.6.20, allows local users to gain privileges via an invalid feature length, which leads to a heap-based buffer overflow. The pppol2tp_recvmsg function in drivers/net/pppol2tp.c in the Linux kernel 2.6 before 2.6.26-rc6 allows remote attackers to cause a denial of service and possibly have unspecified other impact via a crafted PPPOL2TP packet that results in a large value for a certain length variable. Linux kernel 2.6.18, and possibly other versions, when running on AMD64 architectures, allows local users to cause a denial of service via certain ptrace calls. Integer overflow in the sctp_getsockopt_local_addrs_old function in net/sctp/socket.c in the Stream Control Transmission Protocol functionality in the Linux kernel before 2.6.25.9 allows local users to cause a denial of service via vectors involving a large addr_num field in an sctp_getaddrs_old data structure. Race condition in the directory notification subsystem in Linux kernel 2.6.x before 2.6.24.6, and 2.6.25 before 2.6.25.1, allows local users to cause a denial of service and possibly gain privileges via unspecified vectors. The bdx_ioctl_priv function in the tehuti driver in Linux kernel 2.6.x before 2.6.25.1 does not properly check certain information related to register size, which has unspecified impact and local attack vectors, probably related to reading or writing kernel memory. Linux kernel before 2.6.25.2 does not apply a certain protection mechanism for fcntl functionality, which allows local users to execute code in parallel or exploit a race condition to obtain re-ordered access to the descriptor table. Additionaly, a number of fixes has been included for the rtc driver, Arima W651DI audio chipset, unionfs, as well as Tomoyolinux has been updated to 1.6.3, UDF 2.50 support was added, and a few things more. Check the package changelog for more details

Platform:
Mandriva Linux 2008.1
Product:
kernel
Reference:
MDVSA-2008:167
CVE-2008-2136
CVE-2008-2148
CVE-2008-2358
CVE-2008-2750
CVE-2008-1615
CVE-2008-2826
CVE-2008-1375
CVE-2008-1675
CVE-2008-1669
CVE    9
CVE-2008-1615
CVE-2008-1669
CVE-2008-1375
CVE-2008-2826
...
CPE    1
cpe:/o:mandriva:linux:2008.1

© SecPod Technologies