Administrator Tarun Posted February 15, 2008 Administrator Share Posted February 15, 2008 Security researchers have uncovered "critical" security flaws in a version of the Linux kernel used by a large number of popular distributions. The three bugs, which allow unauthorized access to kernel memory, exist in all versions of the Linux kernel up to 126.96.36.199, including Ubuntu, Red Hat, and others. The three bugs allow unauthorized users to read or write to kernel memory locations or to access certain resources in certain servers, according to a SecurityFocus advisory. They could be exploited by malicious, local users to cause denial of service attacks, disclose potentially sensitive information, or gain "root" privileges, according to security experts. The bug affects all versions of the Linux kernel up to version 188.8.131.52, which contains a patch. Distributions such as Ubuntu, Turbolinux, SuSE, Red Hat, Mandriva, Debian and others are affected. The problems are within three functions in the system call fs/splice.c, according to an advisory from Secunia. "In the 2.6.23 kernel, the system call functionality has been further extended resulting in ... critical vulnerabilities," said iSEC Security Research in an advisory. Secunia disagreed about the bugs' seriousness, giving them a less critical ranking. Exploit code for the vulnerabilities has been released publicly on the hacker site milw0rm.com, and Core Security Technologies has also developed a commercial exploit for the bugs, researchers said. Researchers advised system administrators to update their kernels immediately. Last month, a U.S. Department of Homeland Security bug-fixing scheme uncovered an average of one security glitch per 1,000 lines of code in 180 widely used open-source software projects. Secunia also previously discovered that the number of security bugs in open-source Red Hat Linux operating system and Firefox browsers, far outstripped comparable products from Microsoft last year. Source: InfoWorld Link: Lunarsoft Frontpage Quote Link to comment Share on other sites More sharing options...
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.