mailing list archives
From: rPath Update Announcements <announce-noreply () rpath com>
Date: Tue, 06 Mar 2007 15:06:28 -0500
rPath Security Advisory: 2007-0050-1
Products: rPath Linux 1
Exposure Level Classification:
Local Deterministic Vulnerability
kernel=/conary.rpath.com () rpl:devel//1/220.127.116.11-0.1-1
Previous versions of the kernel package are vulnerable to multiple
local user attacks.
One vulnerability is a local user denial of service (system crash)
due to a bug in the key_alloc_serial() function.
The second vulnerability is a local user attack in which a call to
the listxattr() system call on a bad inode will at least corrupt
memory in the calling process, and may allow a malicious program
to read protected kernel memory (information exposure, possibly
enabling other vulnerabilities), system crash, or even executing
arbitrary code provided by the attacker. Bad inodes are not present
on most systems, so in practice the attack will require that the
user be able to mount a filesystem.
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/
- rPSA-2007-0050-1 kernel rPath Update Announcements (Mar 06)