Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Linux :: General :: b06-3660.htm

Kernel



rPSA-2006-0130-1 kernel
rPSA-2006-0130-1 kernel



rPath Security Advisory: 2006-0130-1
Published: 2006-07-17
Products: rPath Linux 1
Rating: Critical
Exposure Level Classification:
    Local Root Deterministic Privilege Escalation
Updated Versions:
kernel=/conary.rpath.com@rpl:devel//1/2.6.16.26-0.1-1 

References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3626 
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2936 
    https://issues.rpath.com/browse/RPL-510
    https://issues.rpath.com/browse/RPL-507

Description:
    In previous versions of the kernel package, a local root privilege
    escalation and a separate denial of service vulnerability are known
    to exist.
    
    The local root privilege escalation allows any local user to use
    the /proc/self/environ file to reliably subvert the root user.
    The local root privilege escalation has a known and publically
    available exploit in current active use.
    
    The denial of service applies if the ftdi_sio module that drives
    a usb-serial hardware device is loaded, in which case any user
    allowed to access the device can consume all the memory on the
    system by producing data faster than the device can consume it,
    either as an intentional attack or unintentionally, leading to a
    denial of service.
    
    A system reboot is required to resolve these vulnerabilities.
    rPath recommends that you update your systems immediately.


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH