From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: From: Alexey Borovskoy To: devel-kernel Date: Wed, 23 Jul 2003 16:03:01 +1300 User-Agent: KMail/1.5 MIME-Version: 1.0 Content-Type: text/plain; charset="koi8-r" Content-Transfer-Encoding: 8bit Content-Disposition: inline Message-Id: <200307231603.01989.alexey_borovskoy@mail.ru> X-Spam: Not detected Subject: [d-kernel] RHSA-2003:238-01 X-BeenThere: devel-kernel@altlinux.ru X-Mailman-Version: 2.1.2 Precedence: list Reply-To: alexey_borovskoy@mail.ru, ALT Linux kernel packages development List-Id: ALT Linux kernel packages development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 23 Jul 2003 03:03:07 -0000 Archived-At: List-Archive: List-Post: Добрый день. Updated 2.4 kernel fixes vulnerabilities http://www.security.nnov.ru/search/document.asp?docid=4884 Меня вот эти штуковины беспокоят: CAN-2003-0462: Paul Starzetz discovered a file read race condition existing in the execve() system call, which could cause a local crash. CAN-2003-0464: A recent change in the RPC code set the reuse flag on newly-created sockets. Olaf Kirch noticed that his could allow normal users to bind to UDP ports used for services such as nfsd. CAN-2003-0552: Jerry Kreuscher discovered that the Forwarding table could be spoofed by sending forged packets with bogus source addresses the same as the local host. Что думает сообщество? Или только после Феста5? -- Алексей. JID:alb@jabber.ru