MDVSA-2008:167 -- Mandriva kernelID: oval:org.secpod.oval:def:301293 | Date: (C)2012-01-07 (M)2023-11-13 |
Class: PATCH | Family: unix |
Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel: Memory leak in the ipip6_rcv function in net/ipv6/sit.c in the Linux kernel before 2.6.25.3 allows remote attackers to cause a denial of service via network traffic to a Simple Internet Transition tunnel interface, related to the pskb_may_pull and kfree_skb functions, and management of an skb reference count. The utimensat system call in Linux kernel 2.6.22 and other versions before 2.6.25.3 does not check file permissions when certain UTIME_NOW and UTIME_OMIT combinations are used, which allows local users to modify file times of arbitrary files, possibly leading to a denial of service. Integer overflow in the dccp_feat_change function in net/dccp/feat.c in the Datagram Congestion Control Protocol subsystem in the Linux kernel 2.6.18, and 2.6.17 through 2.6.20, allows local users to gain privileges via an invalid feature length, which leads to a heap-based buffer overflow. The pppol2tp_recvmsg function in drivers/net/pppol2tp.c in the Linux kernel 2.6 before 2.6.26-rc6 allows remote attackers to cause a denial of service and possibly have unspecified other impact via a crafted PPPOL2TP packet that results in a large value for a certain length variable. Linux kernel 2.6.18, and possibly other versions, when running on AMD64 architectures, allows local users to cause a denial of service via certain ptrace calls. Integer overflow in the sctp_getsockopt_local_addrs_old function in net/sctp/socket.c in the Stream Control Transmission Protocol functionality in the Linux kernel before 2.6.25.9 allows local users to cause a denial of service via vectors involving a large addr_num field in an sctp_getaddrs_old data structure. Race condition in the directory notification subsystem in Linux kernel 2.6.x before 2.6.24.6, and 2.6.25 before 2.6.25.1, allows local users to cause a denial of service and possibly gain privileges via unspecified vectors. The bdx_ioctl_priv function in the tehuti driver in Linux kernel 2.6.x before 2.6.25.1 does not properly check certain information related to register size, which has unspecified impact and local attack vectors, probably related to reading or writing kernel memory. Linux kernel before 2.6.25.2 does not apply a certain protection mechanism for fcntl functionality, which allows local users to execute code in parallel or exploit a race condition to obtain re-ordered access to the descriptor table. Additionaly, a number of fixes has been included for the rtc driver, Arima W651DI audio chipset, unionfs, as well as Tomoyolinux has been updated to 1.6.3, UDF 2.50 support was added, and a few things more. Check the package changelog for more details
Platform: |
Mandriva Linux 2008.1 |