2.6.21.4 fixes three vulnerabilities

Linux kernel 2.6.21.4, fixes three vulnerabilities. A null pointer dereference in netfilter can cause the kernel to crash when processing certain connections. This bug can be triggered remotely. In addition, as a result of a bug in the
cpuset_tasks_read function, users logged onto the system can read part of the kernel memory. This may allow an attacker to access protected information. Finally the kernel also harbors a bug which affects the way seeds for generating random numbers are generated where the system has no entropy source. This may result in applications which rely on random number generators being less secure. -SeeJay

read more | digg story

Advertisements

One Response to “2.6.21.4 fixes three vulnerabilities”

  1. Buddhika Siddhisena Says:

    Oh! so that was what the recent Kubuntu kernel update was all about 🙂 For anyone reading this post and thinks you need to upgrade to 2.6.21.4 don’t worry!.. Chances are that this bug fix has already been back ported the older kernels so doing an apt-get update/upgrade, yum update or what ever should fix this for you.
    If you compiled your kernel from scratch then you’d probably wanna upgrade to this exact version


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: