Ubuntu Security Notice 966-1 - Junjiro R. Okajima discovered that knfsd did not correctly handle strict overcommit. Chris Guo, Jukka Taimisto, and Olli Jarva discovered that SCTP did not correctly handle invalid parameters. A remote attacker could send specially crafted traffic that could crash the system, leading to a denial of service. Mario Mikocevic discovered that GFS2 did not correctly handle certain quota structures. Toshiyuki Okajima discovered that the kernel keyring did not correctly handle dead keyrings. Brad Spengler discovered that Sparc did not correctly implement non-executable stacks. This made userspace applications vulnerable to exploits that would have been otherwise blocked due to non-executable memory protections. Dan Rosenberg discovered that the btrfs clone function did not correctly validate permissions. Dan Rosenberg discovered that GFS2 set_flags function did not correctly validate permissions. Shi Weihua discovered that btrfs xattr_set_acl function did not correctly validate permissions. Andre Osterhues discovered that eCryptfs did not correctly calculate hash values.
e14c23e730862eaa5b43bdf36f4764a5c6a580726d1a6ec790a50f45076c08b7
Debian Linux Security Advisory 2053-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation.
235a0a62a6c6d71e07f774851a912b83c30395263efd5ebe128f10b746878d05