Jump to content

Advisories MDVSA-2010:172: kernel


paul
 Share

Recommended Posts

Some vulnerabilities were discovered and corrected in the Linux

2.6 kernel:

 

Buffer overflow in the ecryptfs_uid_hash macro in

fs/ecryptfs/messaging.c in the eCryptfs subsystem in the Linux

kernel before 2.6.35 might allow local users to gain privileges

or cause a denial of service (system crash) via unspecified

vectors. (CVE-2010-2492)

 

The DNS resolution functionality in the CIFS implementation in the

Linux kernel before 2.6.35, when CONFIG_CIFS_DFS_UPCALL is enabled,

relies on a user's keyring for the dns_resolver upcall in the

cifs.upcall userspace helper, which allows local users to spoof the

results of DNS queries and perform arbitrary CIFS mounts via vectors

involving an add_key call, related to a cache stuffing issue and

MS-DFS referrals. (CVE-2010-2524)

 

The do_anonymous_page function in mm/memory.c in the Linux kernel

before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4,

and 2.6.35.x before 2.6.35.2 does not properly separate the stack

and the heap, which allows context-dependent attackers to execute

arbitrary code by writing to the bottom page of a shared memory

segment, as demonstrated by a memory-exhaustion attack against the

X.Org X server. (CVE-2010-2240)

 

Integer overflow in the ext4_ext_get_blocks function in

fs/ext4/extents.c in the Linux kernel before 2.6.34 allows local

users to cause a denial of service (BUG and system crash) via a

write operation on the last block of a large file, followed by a sync

operation. (CVE-2010-3015)

 

To update your kernel, please follow the directions located at:

 

http://www.mandriva.com/en/security/kernelupdate

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
 Share

×
×
  • Create New...