[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re[3]: Upgrade kernela



Hello gasior79,

Monday, June 09, 2003, 1:20:46 PM, you wrote:

gpop> Cytując za Mattem Zimmermanem z debian-security-announce:

gpop> A number of vulnerabilities have been discovered in the Linux kernel.

gpop> - - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for
gpop>   Linux kernels 2.4.18 and earlier on x86 systems allow local users to
gpop>   kill arbitrary processes via a a binary compatibility interface
gpop>   (lcall)

gpop> - - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
gpop>   drivers do not pad frames with null bytes, which allows remote
gpop>   attackers to obtain information from previous packets or kernel
gpop>   memory by using malformed packets

gpop> - - CAN-2003-0127: The kernel module loader allows local users to gain
gpop>   root privileges by using ptrace to attach to a child process that is
gpop>   spawned by the kernel

gpop> - - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
gpop>   Netfilter IP conntrack module, allows remote attackers to cause a
gpop>   denial of service (CPU consumption) via packets with forged source
gpop>   addresses that cause a large number of hash table collisions related
gpop>   to the PREROUTING chain

gpop> - - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and
gpop>   earlier does not properly restrict privileges, which allows local
gpop>   users to gain read or write access to certain I/O ports.

gpop> - - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel
gpop>   2.4 allows attackers to cause a denial of service ("kernel oops")

gpop> - - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers
gpop>   to modify CPU state registers via a malformed address.

gpop> - - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
gpop>   kernel 2.4 allows remote attackers to cause a denial of service (CPU
gpop>   consumption) via certain packets that cause a large number of hash
gpop>   table collision.

gpop> Post jest z dzisiejszej nocy, więc pewnie dlatego nie ma jeszcze 
gpop> exploitow :-).


czy oni sie wsciekli? ;-(
no wiec wie ktos cos o jakies lacie? ;-)
grsecurity niezalatwi wszystkiego, przynajmniej watpie.

gpop> Pozdrawiam.
gpop> Maciej Gąsiorowski.

pozdrawiam
jr





-- 
Best regards,
 amon                            mailto:amon@mikule.net



Reply to: