Vulnerabilità: CVE-2007-4308

La (1) aac_cfg_open e (2) funzioni aac_compat_ioctl nel percorso SCSI strato di ioctl in aacraid nel kernel Linux 2.6.23-RC2 prima non controllare i permessi per ioctls, che potrebbe consentire agli utenti locali di causare un denial of service o di privilegi di guadagno .


http://www.securityfocus.com/bid/25216
http://www.securityfocus.com/archive/1/488457/100/0/threaded
http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.23-rc2
http://lkml.org/lkml/2007/7/23/195
http://support.avaya.com/elmodocs2/security/ASA-2007-474.htm
http://www.debian.org/security/2007/dsa-1363
http://www.debian.org/security/2008/dsa-1503
http://www.debian.org/security/2008/dsa-1504
http://www.mandriva.com/security/advisories?name=MDKSA-2007:195
http://www.mandriva.com/security/advisories?name=MDKSA-2007:196
http://lists.vmware.com/pipermail/security-announce/2008/000005.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8872
http://www.redhat.com/support/errata/RHSA-2007-0939.html
http://www.redhat.com/support/errata/RHSA-2007-0940.html
http://www.redhat.com/support/errata/RHSA-2007-1049.html
http://www.redhat.com/support/errata/RHSA-2008-0787.html
http://securitytracker.com/id?1019470
http://secunia.com/advisories/26322
http://secunia.com/advisories/26643
http://secunia.com/advisories/26647
http://secunia.com/advisories/26651
http://secunia.com/advisories/27212
http://secunia.com/advisories/27322
http://secunia.com/advisories/27436
http://secunia.com/advisories/27747
http://secunia.com/advisories/27912
http://secunia.com/advisories/27913
http://secunia.com/advisories/28806
http://secunia.com/advisories/29032
http://secunia.com/advisories/29058
http://secunia.com/advisories/29570
http://secunia.com/advisories/33280
http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00007.html
http://www.ubuntu.com/usn/usn-508-1
http://www.ubuntu.com/usn/usn-509-1
http://www.ubuntu.com/usn/usn-510-1
http://www.vupen.com/english/advisories/2007/2786
http://www.vupen.com/english/advisories/2008/0637
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4308


E' possibile lasciare un commento come utenti registrati al sito, accedendo tramite social, account wordpress oppure come utenti anonimi. Nel caso in cui si desideri lasciare un commento come utenti anonimi si verrà avvisati via email di un'eventuale risposta solo se si inserisce l'indirizzo email (facoltativo). L'inserimento di qualsiasi dato nei campi dei commenti è totalmente facoltativo. Chiunque decida di inserire un qualsiasi dato accetta il trattamento di questi ultimi per i fini inerenti al servizio ovvero la risposta al commento e le comunicazioni strettamente necessarie.


Rispondi