Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Linux Kernel Xtensa "ptrace_setxregs()" Memory Disclosure Weakness
Quote:
A weakness has been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information.
The weakness is caused due to the "ptrace_setxregs()" function in arch/xtensa/kernel/ptrace.c not properly verifying the provided pointers, which can be exploited to disclose kernel memory.
Linux Kernel GRO "skb_gro_header_slow()" Denial of Service Vulnerability
Quote:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to an error within the "skb_gro_header_slow()" function (include/linux/netdevice.h), which can be exploited to cause a crash.
Successful exploitation requires that GRO (Generic Receive Offload) is used.
A weakness has been reported in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.
The weakness is caused due to the perf utility loading the configuration file from the current directory, which can be exploited to e.g. gain escalated privileges by tricking a user into running the perf utility in a directory containing a malicious configuration file.
Linux Kernel Event Overflows Denial of Service Vulnerability
Quote:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
The vulnerability is caused due to an error within the handling of software event overflows, which can be exploited to cause a crash via a specially crafted application.
Linux Kernel "CIFSFindNext()" Signedness Error Denial of Service Vulnerability
Quote:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to a signedness error within the "CIFSFindNext()" function (fs/cifs/cifssmb.c), which can be exploited to e.g. crash a client by sending specially crafted CIFS messages.
Successful exploitation requires that a malicious server is used.
Linux Kernel CIFS DFS Denial of Service Vulnerability
Quote:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to an error when mounting CIFS shares with certain DFS referrals, which can be exploited to trigger a "BUG_ON()" in a client by tricking the victim into mounting from a malicious server.
Linux Kernel "apparmor_setprocattr()" Denial of Service Vulnerability
Quote:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
The vulnerability is caused due to an error within the "apparmor_setprocattr()" function (security/apparmor/lsm.c), which can be exploited to trigger a "BUG_ON()" if a process writes malformed data to its "/attr/current" proc file.
Linux Kernel ghash NULL Pointer Dereference Vulnerability
Quote:
A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
The vulnerability is caused due to a NULL pointer dereference error within the implementation of the GHASH algorithm, which can be exploited to e.g. cause a crash via a specially crafted application.
The vulnerability is confirmed in version 2.6.39.4. Other versions may also be affected.
Linux Kernel XFS "xfs_readlink()" Buffer Overflow Vulnerability
Quote:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges.
The vulnerability is caused due to a boundary error within the "xfs_readlink()" function (fs/xfs/xfs_vnodeops.c) and can be exploited to cause a buffer overflow via a specially crafted XFS image.
Linux Kernel "journal_get_superblock()" Denial of Service Vulnerabilities
Quote:
Two vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
The vulnerabilities are caused due to an error within the "journal_get_superblock()" functions (fs/jbd/journal.c and fs/jbd2/journal.c) and can be exploited to trigger a "BUG_ON()" by e.g. mounting specially crafted ext3 images.
Linux Kernel NFSv4 Denial of Service Vulnerability
Quote:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to an error when handling certain NFSv4 responses to ACL attribute requests, which can be exploited to e.g. cause a crash by connecting to a malicious NFSv4 server.
Linux Kernel B.A.T.M.A.N. "bat_socket_read()" Buffer Overflow Vulnerability
Quote:
A vulnerability has been reported in the Linux Kernel, which potentially can be exploited by malicious people to compromise a vulnerable system.
The vulnerability is caused due to a boundary error within the "bat_socket_read()" function (net/batman/icmp_socket.c), which can be exploited to cause a userspace buffer overflow by sending specially crafted packets to a vulnerable system.
The vulnerability is reported in version 2.6.39.4. Other versions may also be affected.
Linux Kernel KVM PIT Denial of Service Vulnerability
Quote:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service).
The vulnerability is caused due to an error in the "create_pit_timer()" function (arch/x86/kvm/i8254.c) when configuring a Programmable Interrupt Timer (PIT) and can be exploited to cause a NULL pointer dereference resulting in the crash of a host.
Linux Kernel "SG_IO" SCSI IOCTL Privilege Escalation Vulnerability
Quote:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users and malicious, local users in a guest virtual machine to gain escalated privileges.
The vulnerability is caused due to SG_IO SCSI IOCTL commands being passed down to the block device without properly honoring access restrictions to e.g. single partitions or LVM volumes. This can e.g. be exploited by a privileged guest user in certain virtualisation setups to read from or write to the host's block device.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.