arch/i386/kernel/sysenter.c in the Virtual Dynamic Shared Objects (vDSO) implementation in the Linux kernel before 2.6.21 does not properly check boundaries, which allows local users to gain privileges or cause a denial of service via unspecified vectors, related to the install_special_mapping, syscall, and syscall32_nopage functions.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://secunia.com/advisories/32485 | third party advisory vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10602 | vdb entry signature |
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7d91d531900bfa1165d445390b3b13a8013f98f7 | |
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21 | |
http://www.redhat.com/support/errata/RHSA-2008-0957.html | vendor advisory |
http://www.securitytracker.com/id?1021137 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=460251 | |
http://www.debian.org/security/2008/dsa-1687 | vendor advisory |
http://secunia.com/advisories/32759 | third party advisory vendor advisory |
http://secunia.com/advisories/33180 | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html | vendor advisory |