kernel
- Author: vmiklos
- Vulnerable: 2.6.22-7sayshell3
- Unaffected: 2.6.22-7sayshell4
A vulnerability with unknown impact has been reported in the Linux Kernel. The vulnerability is caused due to a boundary error within the “isdn_net_setcfg()” function in drivers/isdn/i4l/isdn_net.c when processing IOCTL configuration requests sent to the ISDN pseudo device (/dev/isdnctrl). This can be exploited to cause a buffer overflow via a specially crafted IIOCNETSCF IOCTL request. Successful exploitation requires write access to /dev/isdnctrl.
A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information. The security issue is caused due to the “do_coredump()” function in fs/exec.c not correctly verifying the user ID of a core dump file when dumping the core into an existing file. This can be exploited to e.g. gain access to sensitive information by tricking an application with another user ID into dumping the core into a preexisting file.