[Frugalware-darcs] homepage-ng: FSA209-kernel

voroskoi voroskoi at frugalware.org
Mon Jun 25 17:03:21 CEST 2007

Darcsweb-Url: http://darcs.frugalware.org/darcsweb/darcsweb.cgi?r=homepage-ng;a=darcs_commitdiff;h=20070625155639-dd049-b4ecb9649340a42fab71895034a770eb54fa94b0.gz;

voroskoi <voroskoi at frugalware.org>**20070625155639] {
hunk ./frugalware/xml/security.xml 29
+	<fsa>
+		<id>209</id>
+		<date>2007-06-25</date>
+		<author>voroskoi</author>
+		<package>kernel</package>
+		<vulnerable>2.6.20-5terminus5</vulnerable>
+		<unaffected>2.6.20-5terminus6</unaffected>
+		<bts>http://bugs.frugalware.org/task/2160</bts>
+		<cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2453
+			http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2875
+			http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2876</cve>
+		<desc>Two vulnerabilities and a weakness have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information and malicious people to cause a DoS (Denial of Service).
+			1) A NULL-pointer dereference exists within netfilter when handling new SCTP connections with unknown chunk types. This can be exploited to crash the kernel by sending malicious packets.
+			2) An underflow error within the "cpuset_task_read()" function in /kernel/cpuset.c can be exploited to read kernel memory, which may contain potentially sensitive information. Successful exploitation requires that the attacker has access to open the /dev/cpuset/tasks file (the cpuset file system needs to be mounted).
+			3) The kernel does not handle seeds for the random number generator correctly. This may weaken the security of applications relying on the randomness of the kernel random number generator.</desc>
+	</fsa>

More information about the Frugalware-darcs mailing list