Kernel Live Patch Security Notice LSN-0026-1

Discussion in 'News Aggregator' started by Packet Storm, 25 Jul 2017.

  1. Packet Storm

    Packet Storm Guest

    It was discovered that a use-after-free flaw existed in the filesystem encryption subsystem in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). Jann Horn discovered that the extended Berkeley Packet Filter (eBPF) implementation in the Linux kernel could overflow reference counters on systems with more than 32GB of physical ram and with RLIMIT_MEMLOCK set to infinite. A local unprivileged attacker could use to create a use-after- free situation, causing a denial of service (system crash) or possibly gain administrative privileges. Various other issues were also addressed.

    Continue reading...
     

Share This Page

Loading...