---------------------------------------------------------------------- Secunia Network Software Inspector 2.0 (NSI) - Public Beta The Public Beta has ended. Thanks to all that participated. Learn more: http://secunia.com/network_software_inspector_2/ ---------------------------------------------------------------------- TITLE: Linux Kernel Multiple Vulnerabilities SECUNIA ADVISORY ID: SA30044 VERIFY ADVISORY: http://secunia.com/advisories/30044/ CRITICAL: Less critical IMPACT: Privilege escalation, DoS WHERE: >From local network REVISION: 2.0 originally posted 2008-05-02 OPERATING SYSTEM: Linux Kernel 2.6.x http://secunia.com/product/2719/ DESCRIPTION: Some vulnerabilities have been reported in the Linux kernel, which can be exploited by malicious people to cause a DoS (Denial of Service), and by malicious, local users to cause a DoS or to potentially gain escalated privileges. 1) A race condition error exists in the dnotify subsystem between calls to "fcntl()" and "close()". This can be exploited to cause a system crash or potentially gain root privileges. 2) A boundary error in the Tehuti network driver can be exploited to corrupt kernel memory via specially crafted "BDX_OP_WRITE" IOCTL calls. The vulnerabilities are reported in versions prior to 2.6.25.1. 3) An error exists in the implementation of the IPsec protocol. This can be exploited to crash an affected system via fragmented ESP packets. Successful exploitation of the vulnerability requires the ability to manipulate network packets sent from an authenticated IPsec peer. This vulnerability is reported in versions prior to 2.6.25. SOLUTION: Update to version 2.6.25.1. PROVIDED AND/OR DISCOVERED BY: 1, 2) Reported by the vendor. 3) Dirk Nehring CHANGELOG: 2008-05-07: Added vulnerability #3 to the advisory. Updated credits and the "Original Advisory" section. ORIGINAL ADVISORY: Linux Kernel: http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.1 http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25 Dirk Nehring: http://marc.info/?l=linux-netdev&m=120372380411259&w=2 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------