TUCoPS :: Linux :: General :: b06-3592.htm

Kernel
rPSA-2006-0122-2 kernel
rPSA-2006-0122-2 kernel



rPath Security Advisory: 2006-0122-2
Published: 2006-07-07
Updated:
    2006-07-13 Upgraded to Critical status with additional information
Products: rPath Linux 1
Rating: Critical
Exposure Level Classification:
    Local Root Deterministic Privilege Escalation
Updated Versions:
kernel=/conary.rpath.com@rpl:devel//1/2.6.16.24-0.1-1 

References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2451 
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2934 
    https://issues.rpath.com/browse/RPL-488

Description:
    Previous versions of the kernel package have two specific
    vulnerablities that are addressed in this version.
    
    The first vulnerability allows any local user to fill up file
    systems by causing core dumps to write to directories to which
    they do not have write access permissions, and on most systems
    (including any system that provides a generally-accessible "cron"
    or "at" service) to escalate to run arbitrary code as the root user.
    An exploit for this privilege escalation vulnerability is
    publically available and in active use.
    
    The second vulnerability applies only to systems using the SCTP
    protocol, which is not enabled by default, and the tools required
    to configure it (lksctp-tools) are not included in rPath Linux.
    This vulnerability, which cannot apply to systems without
    lksctp-tools installed, enables a remote denial of service attack
    in which specially-crafted packets can crash the system.
    
    A system reboot is required to make the update to resolve these
    vulnerabilities effective.  rPath strongly recommends that all
    users apply this update.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH