[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Re: Upgrade kernela



Użytkownik amon <amon@mikule.net> napisał:

>ja zainstalowalem grsecurity i jak narazie mam jadro czyste...
>przynajmniej nieznalazlem zadnego dzialajacego exploita.
>
>w /boot masz config kernela
>
>powodzenia

Cytując za Mattem Zimmermanem z debian-security-announce:

A number of vulnerabilities have been discovered in the Linux kernel.

- - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for
  Linux kernels 2.4.18 and earlier on x86 systems allow local users to
  kill arbitrary processes via a a binary compatibility interface
  (lcall)

- - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
  drivers do not pad frames with null bytes, which allows remote
  attackers to obtain information from previous packets or kernel
  memory by using malformed packets

- - CAN-2003-0127: The kernel module loader allows local users to gain
  root privileges by using ptrace to attach to a child process that is
  spawned by the kernel

- - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
  Netfilter IP conntrack module, allows remote attackers to cause a
  denial of service (CPU consumption) via packets with forged source
  addresses that cause a large number of hash table collisions related
  to the PREROUTING chain

- - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and
  earlier does not properly restrict privileges, which allows local
  users to gain read or write access to certain I/O ports.

- - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel
  2.4 allows attackers to cause a denial of service ("kernel oops")

- - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers
  to modify CPU state registers via a malformed address.

- - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
  kernel 2.4 allows remote attackers to cause a denial of service (CPU
  consumption) via certain packets that cause a large number of hash
  table collision.

Post jest z dzisiejszej nocy, więc pewnie dlatego nie ma jeszcze 
exploitow :-).

Pozdrawiam.
Maciej Gąsiorowski.



Reply to: