Language Selection

English French German Italian Portuguese Spanish

Two Vulnerabilities Provide Root Access on Linux

Filed under
Linux
Security

Two new vulnerabilities affecting Linux were uncovered this week that could potentially be used by malicious hackers to gain root privileges.

One vulnerability, which was reported on Tuesday by security firm VSR, arises from a flaw in the implementation of the Reliable Datagram Sockets protocol (RDS) in versions 2.6.30 through 2.6.36-rc8 of the Linux kernel.

Known as CVE-2010-3904, the bug could allow a local attacker to issue specially crafted socket function calls to write arbitrary values into kernel memory and thereby escalate privileges to root, giving the attacker "superuser," administrator status.

rest here




Linux Kernel Update

pcworld.com: A new update to the Linux kernel adds a raft of security features, driver support, and other enhancements without increasing the overall size of the kernel at all.

That's a rarity, given that enhancements in each update have tended over the years to increase the kernel's size. This time around, though, there are a number of improvements that will be visible to users, but without any extra mass.

It won't be long before this new kernel is integrated into most popular Linux distributions. Here are some of the highlights of what users can expect.

Beefed Up Security

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

digiKam Software Collection 4.6.0 released...

The digiKam Team is proud to announce the release of digiKam Software Collection 4.6.0. This release includes many bugs fixes in Image Editor and Batch Queue Mananger. Thanks to Maik Qualmann and Jan Wolter to propose patches in KDE bugzilla. See the new list of the issues closed in digiKam 4.6.0 available through the KDE Bugs-tracking System. Read more

What Does It Mean for Your Computer to Be Loyal?

We say that running free software on your computer means that its operation is under your control. Implicitly this presupposes that your computer will do what your programs tell it to do, and no more. In other words, that your computer will be loyal to you. In 1990 we took that for granted; nowadays, many computers are designed to be disloyal to their users. It has become necessary to spell out what it means for your computer to be a loyal platform that obeys your decisions, which you express by telling it to run certain programs. Read more