Secunia Security Advisory - A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges.
dfa635f4b32de258ed859c86a875167997a7065e0d790f60fab899bbb1b42f59
----------------------------------------------------------------------
Want a new job?
https://secunia.com/secunia_security_specialist/
https://secunia.com/hardcore_disassembler_and_reverse_engineer/
International Partner Manager - Project Sales in the IT-Security
Industry:
https://corporate.secunia.com/about_secunia/64/
----------------------------------------------------------------------
TITLE:
Linux Kernel LDT Buffer Size Handling Vulnerability
SECUNIA ADVISORY ID:
SA31172
VERIFY ADVISORY:
https://secunia.com/advisories/31172/
CRITICAL:
Less critical
IMPACT:
Privilege escalation, DoS
WHERE:
Local system
OPERATING SYSTEM:
Linux Kernel 2.6.x
https://secunia.com/product/2719/
DESCRIPTION:
A vulnerability has been reported in the Linux Kernel, which can be
exploited by malicious, local users to cause a DoS (Denial of
Service) and potentially gain escalated privileges.
The vulnerability is caused due to an error within the LDT buffer
size handling on x86_64 machines and can be exploited to crash a
system or execute arbitrary code with kernel privileges.
The vulnerability is reported in versions prior to 2.6.25.11.
SOLUTION:
Update to version 2.6.25.11.
PROVIDED AND/OR DISCOVERED BY:
Reported in a SUSE advisory.
ORIGINAL ADVISORY:
SUSE:
https://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.html
Linux Kernel 2.6.25.11 ChangeLog:
https://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.11
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
https://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
https://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------