Linux 2.2.16 security release
The following security problems are fixed by this release
o Setuid applications. even when correctly checking for failures of
setuid() calls could fail to drop priviledges if the invoker had
made certain adjustments to the capability sets
o Opening a socket and issuing multiple connects on it could be used
to hang the box
o Readv/writev might misbehave on some very large inputs
o Potentially remote exploitable hole in the sunrpc code
o User causable oopses in Appletalk and Socket code
o Obscure exploitable bugs in the Sparc kernel
The full list of enhancements and other bug fixes will follow later.
Recommendations:
You should consider updating your 2.2 kernel to 2.2.16 if
o You have untrusted users on your system
o You have publically accessible kernel sunrpc services
Other major bug fixes include
o The tcp retransmit crash on very high load
o Poor VM performance under some load patterns
o Fix for 3com 3c590 8K card stalls
Alan
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/
This archive was generated by hypermail 2b29 : Thu Jun 15 2000 - 21:00:15 EST