According to postings at Kernel.org concerning a report by Vilmos Nebehaj which was consequently signed off by Linus Torvalds and Chris Wright, the Linux Kernel 2.6.x has multiple security vulnerabilities.
Well, to be precise, two vulnerabilities and what is described as a ‘weakness’ which are capable of being exploited by a malicious local user who could, under the right circumstances, reveal personal information as well as instigate a Denial of Service attack.
The three security flaws are as follows:
- A NULL-pointer dereference within netfilter when handling SCTP connections with unknown chunk types can be exploited to crash the kernel, hence the DoS attack vulnerability.
- The cpuset_task_read() function in /kernel/cpuset.c has an underflkow error which could potentially be exploited in order to read the kernel memory, hence the personal information disclosure vulnerability.
- A problem whereby the kernel itself mishandles seeds for random number generation, potentially weakening application security for those programs relying upon secure random number generation, which is described as a weakness although I am more inclined to lump it right into the whole vulnerability basket as it sure makes those applications so impacted rather vulnerable.
And the recommended solution would be? Yep, you guessed it, updating to Linux Kernel version 126.96.36.199