Language Selection

English French German Italian Portuguese Spanish

Linux Kernel Local DoS and Security Bypass Issues

Filed under
Security

Rated as : Low Risk

Multiple vulnerabilities were identified in Linux Kernel, which could be exploited by local attackers to cause a denial of service or bypass certain security restrictions.

The first issue is due to a memory leak error in "/security/keys/request_key_auth.c", which could be exploited by malicious users to cause a denial of service.

The second vulnerability is due to a memory leak error in "/fs/namei.c" when the CONFIG_AUDITSYSCALL option is enabled, which could be exploited by malicious users to cause a denial of service.

The third flaw is due to an error in the file "drivers/char/drm/drm_stub.c" that does not properly validate "debug" sysfs permissions, which could be exploited by local attackers to bypass certain security restrictions and enable drm debugging.

Full Details.

More in Tux Machines

KDE Plasma 5.7.2 Introduces Lots of Plasma Workspace Improvements, KWin Fixes

KDE released the second maintenance update for the KDE Plasma 5.7 desktop environment series, which has already been adopted by several popular GNU/Linux operating systems. Read more

Gain access to an ARM server running Linux OS, through the cloud

The Linaro Developer Cloud has gone live, and users can apply to test an ARM-based server with Linux Read more

SparkyLinux Now Lets Users Test Drive Linux Kernel 4.7, Here's How to Install It

Just one day after the announcement of the GA release of the Linux 4.7 kernel, the SparkyLinux developers inform their users that they can now test drive the new kernel from the unstable repository. Read more

Clear Linux Is Among the First Distros to Adopt Kernel 4.7, X.Org Server 1.18.4

Today, July 26, 2016, Softpedia was informed by the Clear Linux team about the availability of new software updates for the GNU/Linux operating system designed for the Intel architecture. Read more