Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: March 27th, 2015
Linux Security Week: March 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Pardus: 2010-112: Kernel: Multiple Vulnerabilities Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Multiple vulnerabilities have been fixed in kernel
Pardus Linux Security Advisory 2010-112 
      Date: 2010-08-12
  Severity: 4
      Type: Remote

Multiple vulnerabilities have been fixed in kernel


A flaw was found in the handling of the  SWAPEXT  IOCTL  in  the  Linux
kernel XFS file system implementation. A local user could use this flaw
to read write-only files, that they do not own, on an XFS file  system.
This could lead to unintended information disclosure.


A flaw was found in the CIFSSMBWrite() function  in  the  Linux  kernel
Common Internet File System (CIFS) implementation.  A  remote  attacker
could send a specially-crafted SMB response packet  to  a  target  CIFS
client, resulting in a kernel panic (denial of service)


A flaw was found in the pppol2tp_xmit() function in  the  Linux  kernel
l2tp implementation. When transmitting L2TP frames, outgoing interface's
UDP checksum hardware assist capabilities can  be  NULL,  causing  NULL
pointer dereference.


A buffer overflow flaws were found in the Linux kernel's implementation
of the server-side External Data Representation (XDR) for  the  Network
File System (NFS) version 4. An attacker on the local network could send
a specially-crafted large compound request to the NFSv4  server,  which
could possibly result  in  a  kernel  panic  (denial  of  service)  or,
potentially, code execution.


The  BTRFS_IOC_CLONE and  BTRFS_IOC_CLONE_RANGE  ioctls  should  check
whether the donor file is append-only before writing to it.


The BTRFS_IOC_CLONE_RANGE ioctl appears to have an integer overflow that
allows a user to specify an out-of-bounds range to copy from the source
file (if off + len wraps around).


The problem was in the way the gfs2 directory code was trying to re-use
sentinel directory entries. A local, unprivileged user on a gfs2 mounted
directory  can trigger  this  issue,  resulting  in  a  NULL   pointer

Affected packages:

  Pardus 2009:
    kernel, all before
    kernel-pae, all before

There are update(s) for kernel, kernel-pae. You  can  update  them  via
Package Manager or with a single command from console:

    pisi up kernel kernel-pae


< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
FBI Quietly Removes Recommendation To Encrypt Your Phone
And the prize for LEAST SECURE BROWSER goes to ... Chrome!
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.