Linux Security
    Linux Security
    Linux Security

    Debian: Linux 2.6.18 fix several vulnerabilities DSA-1381-2

    Date 12 Oct 2007
    3149
    Posted By LinuxSecurity Advisories
    Several local vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems...
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 1381-2                    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                               Dann Frazier
    October 12th, 2007                      https://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : linux-2.6
    Vulnerability  : several
    Problem-Type   : local
    Debian-specific: no
    CVE ID         : CVE-2006-5755 CVE-2007-4133 CVE-2007-4573 CVE-2007-5093
    
    Several local vulnerabilities have been discovered in the Linux kernel
    that may lead to a denial of service or the execution of arbitrary
    code. The Common Vulnerabilities and Exposures project identifies the
    following problems:
    
    CVE-2006-5755
    
        The NT bit maybe leaked into the next task which can local attackers
        to cause a Denial of Service (crash) on systems which run the 'amd64'
        flavour kernel. The stable distribution ('etch') was not believed to
        be vulnerable to this issue at the time of release, however Bastian
        Blank discovered that this issue still applied to the 'xen-amd64' and
        'xen-vserver-amd64' flavours, and is resolved by this DSA.
    
    CVE-2007-4133
    
        Hugh Dickins discovered a potential local DoS (panic) in hugetlbfs.
        A misconversion of hugetlb_vmtruncate_list to prio_tree may allow
        local users to trigger a BUG_ON() call in exit_mmap.
    
    CVE-2007-4573
    
        Wojciech Purczynski discovered a vulnerability that can be exploited
        by a local user to obtain superuser privileges on x86_64 systems.
        This resulted from improper clearing of the high bits of registers
        during ia32 system call emulation. This vulnerability is relevant
        to the Debian amd64 port as well as users of the i386 port who run
        the amd64 linux-image flavour.
    
        DSA-1378 resolved this problem for the 'amd64' flavour kernels, but
        Tim Wickberg and Ralf Hemmenst	

    Advisories

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/49-tis-the-season-of-giving-how-have-you-given-back-to-the-open-source-community?task=poll.vote&format=json
    49
    radio
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"11","type":"x","order":"1","pct":34.38,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":18.75,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":46.88,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.