Secunia Security Advisory - Two vulnerabilities have been reported in the Linux kernel. One has an unknown impact, and the other can be exploited by malicious, local users to cause a DoS (Denial of Service).
14e0309e3c71683cd933a14d76ddb237d636e6716bc880cc1c1b79cf035c1eb3
----------------------------------------------------------------------
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-
Sicherheit:
http://secunia.com/secunia_vacancies/
----------------------------------------------------------------------
TITLE:
Linux Kernel Two Vulnerabilities
SECUNIA ADVISORY ID:
SA15786
VERIFY ADVISORY:
http://secunia.com/advisories/15786/
CRITICAL:
Less critical
IMPACT:
Unknown, DoS
WHERE:
Local system
OPERATING SYSTEM:
Linux Kernel 2.6.x
http://secunia.com/product/2719/
DESCRIPTION:
Two vulnerabilities have been reported in the Linux kernel. One has
an unknown impact, and the other can be exploited by malicious, local
users to cause a DoS (Denial of Service).
1) An error exists in the handling of access to ar.rsc via ptrace and
restore_sigcontext.
2) An error in the delivery of signals can cause a kernel panic when
a sub-thread "exec" with a pending timer.
SOLUTION:
Update to version 2.6.12.1.
http://kernel.org/
PROVIDED AND/OR DISCOVERED BY:
Reported by vendor.
ORIGINAL ADVISORY:
Kernel.org:
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.1
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------