LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 11-24-2010, 06:57 PM   #241
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Linux Kernel Socket Denial of Service Vulnerability


Quote:
Vegard Nossum has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

The vulnerability is caused due to a design error when handling Unix sockets, which can be exploited to cause an out of memory condition via a specially crafted application.
Secunia Advisory
 
Old 11-24-2010, 06:58 PM   #242
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Linux Kernel inotify Memory Leak Denial of Service Vulnerability

Quote:
Vegard Nossum has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

The vulnerability is caused due to a memory leak within the "inotify_init()" system call in fs/notify/inotify/inotify_user.c, which potentially can be exploited to cause an out of memory condition.
Secunia Advisory
 
1 members found this post helpful.
Old 12-10-2010, 02:02 PM   #243
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Linux Kernel "install_special_mapping()" mmap_min_addr Security Bypass Weakness

Quote:
A weakness has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions.

The weakness is caused due to the "install_special_mapping()" function in mm/mmap.c not properly restricting mappings below the limit set via the "mmap_min_addr" sysctl, which can be exploited to map memory into forbidden areas.
Secunia Advisory
 
Old 12-23-2010, 03:06 PM   #244
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Linux Kernel "irda_getsockopt()" Integer Underflow Weakness

Quote:
Dan Rosenberg has reported a weakness in the Linux Kernel, which can be exploited by malicious, local users to disclose system information.

The weakness is caused due to an integer underflow within the "irda_getsockopt()" function in net/irda/af_irda.c and can be exploited to e.g. disclose kernel memory via a specially crafted "IRLMP_ENUMDEVICES" getsockopt.
Secunia Advisory
 
Old 01-01-2011, 07:37 AM   #245
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Linux Kernel "load_mixer_volumes()" Vulnerabilities

Quote:
Dan Rosenberg has reported two vulnerabilities in the Linux Kernel, which can be exploited by malicious, local users to disclose certain system information and potentially gain escalated privileges.

1) A boundary error within the "load_mixer_volumes()" function in sound/oss/soundcard.c can be exploited to cause a buffer overflow and e.g. potentially execute arbitrary code in kernel mode by sending a specially crafted SOUND_MIXER_SETLEVELS IOCTL.

2) An error within the "load_mixer_volumes()" function in sound/oss/soundcard.c can be exploited to disclose certain kernel memory by sending a specially crafted SOUND_MIXER_SETLEVELS IOCTL.

Successful exploitation requires that OSS is used and the attacker has write access to a vulnerable audio device (e.g. is member of the "audio" group).
Secunia Advisory
 
Old 01-25-2011, 07:59 PM   #246
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Linux Kernel "dvb_ca_ioctl()" Memory Corruption Vulnerability

Quote:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges.

The vulnerability is caused due to an error within the "dvb_ca_ioctl()" function in drivers/media/dvb/ttpci/av7110_ca.c, which can be exploited to cause a kernel memory corruption by sending a specially crafted IOCTL.
Secunia Advisory
 
Old 02-17-2011, 02:18 PM   #247
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Linux Kernel "xfs_fs_geometry()" Memory Disclosure Weakness

Quote:
A weakness has been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose certain system information.

The weakness is caused due to the "xfs_fs_geometry()" function in fs/xfs/xfs_fsops.c is not properly initialising the "logsunit" member of the "xfs_fsop_geom_t" structure before copying it to userspace, which can be exploited to disclose kernel stack memory.
Secunia Advisory
 
Old 02-22-2011, 03:25 PM   #248
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Linux Kernel World-Writable sysfs and procfs Files Weaknesses

Quote:
Some weaknesses have been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions.

The weaknesses are caused due to various procfs and sysfs file being world-writable, which can be exploited to e.g. change certain settings, write into certain hardware registers or the NVRAM, or install certain firmware.
Secunia Advisory
 
Old 02-25-2011, 05:27 PM   #249
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Linux Kernel "/proc/<pid>/" Permissions Handling Weakness

Quote:
halfdog has discovered a weakness in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions.

The weakness is caused due to improper permissions handling of opened files within the "/proc/<pid>/" directory when a SUID program is being executed. This can be exploited to disclose certain memory information or manipulate some process settings (e.g. coredump_filter).

The weakness is confirmed in version 2.6.37. Other versions may also be affected.
Secunia Advisory
 
Old 03-02-2011, 07:52 AM   #250
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Linux Kernel Multiple Vulnerabilities

Quote:
Vasiliy Kulikov has reported a weakness and some vulnerabilities in the Linux Kernel, which can be exploited by malicious, local users to disclose system information or cause a DoS (Denial of Service).

1) The "sco_sock_getsockopt_old()" function in net/bluetooth/sco.c is not properly initialising a member of a certain structure before copying it to userspace, which can be exploited to disclose kernel stack memory.

2) The "bnep_sock_ioctl()" function in net/bluetooth/bnep/sock.c does not properly terminate the device name, which can be exploited to cause a "BUG()" or disclose system information.

3) The "do_replace()" function in net/bridge/netfilter/ebtables.c does not properly terminate a string, which can be exploited to disclose system information.

Successful exploitation of vulnerabilities #2 and #3 requires CAP_NET_ADMIN capabilities.
Secunia Advisory
 
Old 03-04-2011, 09:34 PM   #251
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Linux Kernel epoll Denial of Service Vulnerability

Quote:
A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

The vulnerability is caused due to an error within the epoll implementation, which can be exploited to cause a high CPU consumption via nested epoll structures.

The vulnerability is confirmed in version 2.6.37. Other versions may also be affected.
Secunia Advisory
 
Old 03-04-2011, 09:35 PM   #252
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Linux Kernel DNS Resolver Key NULL Pointer Dereference Vulnerability

Quote:
A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to a NULL pointer dereference error when reading a DNS resolver key instantiated with an error indication, which can be exploited to crash the kernel.

The vulnerability is confirmed in version 2.6.37. Other versions may also be affected.
Secunia Advisory
 
Old 03-14-2011, 07:02 PM   #253
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Linux Kernel InfiniBand Request Handling Denial of Service

Quote:
A weakness has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service).

The weakness is caused due to a race condition within the InfiniBand request handling, which can be exploited to cause a kernel crash.
Secunia Advisory
 
Old 03-14-2011, 07:06 PM   #254
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Linux Kernel "ldm_frag_add()" Buffer Overflow Vulnerability

Quote:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people with physical access to potentially compromise a vulnerable system.

The vulnerability is caused due to an error within the "ldm_frag_add()" function in fs/partitions/ldm.c, which can be exploited to cause a buffer overflow by e.g. plugging in a USB drive with a specially crafted LDM partition.
Secunia Advisory
 
Old 03-14-2011, 07:09 PM   #255
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Linux Kernel TPM Information Disclosure Weakness

Quote:
Some weaknesses have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information.

The weaknesses are caused due to the "tpm_open()", "tpm_transmit()", "tpm_write()", and "tpm_read()" functions in drivers/char/tpm/tpm.c do not properly clearing certain memory, which can be exploited to disclose potentially sensitive information.
Secunia Advisory
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Kernel 2.4 in Zipslack (Waring: unable to open an initial console | Kernel Panic...) kurtamos Linux - General 2 05-10-2006 12:58 PM
Kernel-Patch Debian Logo 2.6.2 not correctly working for custom kernel 2.6.11 smp deepclutch Debian 3 06-27-2005 03:59 AM
kernel panic: try passing init= option to kernel...installation with Red Hat 9 kergen Linux - Hardware 1 09-30-2004 03:28 AM
are there any vulns for kernel 2.6.5? trax Linux - Security 2 04-24-2004 04:10 PM
snort rules to vulns not yet published zuessh Linux - Security 1 02-12-2004 02:17 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 01:19 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration