Wednesday, September 29, 2010

Linux 2.6 kernel: vulnerabilities

Users of Linux 2.6 kernel please be advised of Some vulnerabilities that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
MDVSA-2010:188: [MDVSA-2010:188] kernel
Problem Description:



Some vulnerabilities were discovered and corrected in the Linux

2.6 kernel:



fs/namei.c in Linux kernel 2.6.18 through 2.6.34 does not always

follow NFS automount symlinks, which allows attackers to have an

unknown impact, related to LOOKUP_FOLLOW. (CVE-2010-1088)



The tc_fill_tclass function in net/sched/sch_api.c in the tc subsystem

in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.31-rc9

does not initialize certain (1) tcm__pad1 and (2) tcm__pad2 structure

members, which might allow local users to obtain sensitive information

from kernel memory via unspecified vectors. (CVE-2009-3228)Read more at www.criticalwatch.com
 

No comments:

Post a Comment