Linux kernel 'stick' deadly error

Security experts have recently discovered three extremely dangerous security issues in a number of relatively popular versions of the open-source Linux operating system such as Ubuntu, Turbolinux, SuSE, Red Hat, Mandriva, Debian. .

SecurityFocus said the security flaws could be exploited by hackers to read and write data to the operating system kernel memory partition or gain access to server system resources.

The above errors - the recommended security community - can also be exploited to attack denial of service, steal data information or gain access to ROOT level to the system using the operating system version of the error. .

Picture 1 of Linux kernel 'stick' deadly error The confirmed Linux kernel kernel version is version 2.6.24.1. This is a relatively popular kernel version. Most Linux versions available on the market use this kernel version.

Security firm Secunia said the cause of the error is from three functions directly under the 'system call fs / splice.c' system. 'It can be said that the error started from kernel version 2.6.23. This is the time when the system call function is expanded. In addition to the add-ons, the extension also offers extremely dangerous security bugs'.

The code for exploiting these Linux kernel security errors is now widely available through Milw0rm.com. Core Security Technology alone developed a commercial version of the exploit tool for testing the above Linux kernel bugs.

Security experts recommend that system administrators use Linux to quickly upgrade the operating system kernel as soon as possible.