|Main Archive Page > Month Archives > bugtraq archives|
rPath Security Advisory: 2008-0189-1
rPath Appliance Platform Linux Service 1
rPath Linux 1
rPath Linux 2
Exposure Level Classification:
Remote User Deterministic Privilege Escalation Updated Versions: kernel=conary.rpath.com@rpl:1-vmware/184.108.40.206-0.4-1 kernel=conary.rpath.com@rpl:1-xen/220.127.116.11-0.5-1 kernel=conary.rpath.com@rpl:1/18.104.22.168-0.4-1 kernel=conary.rpath.com@rpl:2-xen/22.214.171.124-4-1 kernel=conary.rpath.com@rpl:2/126.96.36.199-4-0.1 kernel=rap.rpath.com@rpath:linux-1/188.8.131.52-3-1 xen=conary.rpath.com@rpl:2/3.1.2-1.1-1
Previous versions of the kernel package are vulnerable to a buffer overflow in the cifs and ip_nat_snmp_basic modules which can allow a remote denial of service or possible arbitrary code execution.
In addition, support has been added for newer Intel 10Gb Ethernet adapters, and a bug which effects device ordering on certain Dell and HP systems has been resolved.
A system reboot is required to resolve these issues.
Copyright 2008 rPath, Inc.
This file is distributed under the terms of the MIT License. A copy is available at http://www.rpath.com/permanent/mit-license.html