Skip to main content

RedHat Linux Kernel Multiple Vulnerabilities

Last Update Date: 21 Aug 2013 18:50 Release Date: 21 Aug 2013 3240 Views

RISK: High Risk

TYPE: Operating Systems - Linux

TYPE: Linux

Multiple vulnerabilities have been identified in RedHat Linux Kernal, which can be exploited by malicious people to cause root compromise, access privileged data, and denial of service.

  1. A flaw was found in the way the Linux kernel's Stream Control Transmission Protocol (SCTP) implementation handled duplicate cookies. If a local user queried SCTP connection information at the same time a remote attacker has initialized a crafted SCTP connection to the system, it could trigger a NULL pointer dereference, causing the system to crash.
  2. An invalid free flaw was found in the Linux kernel's TCP/IP protocol suite implementation. A local, unprivileged user could use this flaw to corrupt kernel memory via crafted sendmsg() calls, allowing them to cause a denial of service or, potentially, escalate their privileges on the system.
  3. An invalid pointer dereference flaw was found in the Linux kernel's TCP/IP protocol suite implementation. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system by using sendmsg() with an IPv6 socket connected to an IPv4 destination.
  4. Information leak flaws in the Linux kernel could allow a privileged, local user to leak kernel memory to user-space.

Impact

  • Denial of Service
  • Elevation of Privilege
  • Information Disclosure

System / Technologies affected

  • Red Hat Enterprise Linux Server 5
  • Red Hat Enterprise Linux WS/Desktop 5
  • Linux variants

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.


Vulnerability Identifier


Source


Related Link