ALT Linux sysadmins discussion
 help / color / mirror / Atom feed
From: Michael Shigorin <mike@osdn.org.ua>
To: sysadmins@lists.altlinux.org
Cc: Sergey Vlasov <vsu@altlinux.ru>
Subject: [Sysadmins] SI: e100 => local kernel privilege escalation
Date: Thu, 7 Dec 2006 11:28:13 +0200
Message-ID: <20061207092813.GQ21076@osdn.org.ua> (raw)

[-- Attachment #1: Type: text/plain, Size: 780 bytes --]

Summary:
A vulnerability exists in all PCI, PCI-X and PCIe Intel network
adapter drivers that could allow unprivileged code executing on
an affected system to perform a local privilege escalation.

Description:
This vulnerability is due to a buffer overflow that could be
caused by incorrect use of a function call. This condition could
allow unauthorized code to be introduced that could be run with
kernel-level privileges.

e100:  vulnerable <= 3.5.14, fixed >= 3.5.17
e1000: vulnerable <= 7.2.7,  fixed >= 7.3.15

http://www.intel.com/support/network/sb/CS-023726.htm

2 vsu: получится ли выпустить обновление ядра для ALM2.4?
(или самому собирать vs-smp)

-- 
 ---- WBR, Michael Shigorin <mike@altlinux.ru>
  ------ Linux.Kiev http://www.linux.kiev.ua/

[-- Attachment #2: Type: application/pgp-signature, Size: 189 bytes --]

             reply	other threads:[~2006-12-07  9:28 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2006-12-07  9:28 Michael Shigorin [this message]
2006-12-07 10:28 ` Michael Shigorin
2006-12-07 12:52 ` Sergey
2006-12-07 22:36   ` Michael Shigorin
2006-12-09  8:21 ` Peter Volkov
2006-12-09 23:10   ` Michael Shigorin
2006-12-15  8:32 ` Peter Volkov
2006-12-15 18:44   ` Michael Shigorin

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20061207092813.GQ21076@osdn.org.ua \
    --to=mike@osdn.org.ua \
    --cc=shigorin@gmail.com \
    --cc=sysadmins@lists.altlinux.org \
    --cc=vsu@altlinux.ru \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link

ALT Linux sysadmins discussion

This inbox may be cloned and mirrored by anyone:

	git clone --mirror http://lore.altlinux.org/sysadmins/0 sysadmins/git/0.git

	# If you have public-inbox 1.1+ installed, you may
	# initialize and index your mirror using the following commands:
	public-inbox-init -V2 sysadmins sysadmins/ http://lore.altlinux.org/sysadmins \
		sysadmins@lists.altlinux.org sysadmins@lists.altlinux.ru sysadmins@lists.altlinux.com
	public-inbox-index sysadmins

Example config snippet for mirrors.
Newsgroup available over NNTP:
	nntp://lore.altlinux.org/org.altlinux.lists.sysadmins


AGPL code for this site: git clone https://public-inbox.org/public-inbox.git