[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SA:2009:031 -- SUSE kernel remote code execution

ID: oval:org.secpod.oval:def:400073Date: (C)2012-01-31   (M)2024-02-19
Class: PATCHFamily: unix




This kernel update for openSUSE 11.0 fixes some bugs and several security problems. The following security issues are fixed: CVE-2009-0065: Buffer overflow in net/sctp/sm_statefuns.c in the Stream Control Transmission Protocol implementation in the Linux kernel allows remote attackers to remotely execute code via an FWD-TSN chunk with a large stream ID. CVE-2009-1961: A local denial of service problem in the splice system call. CVE-2009-1630: The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel when atomic_open is available, does not check execute permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 file server. CVE-2009-0834: The audit_syscall_entry function in the Linux kernel on the x86_64 platform did not properly handle a 32-bit process making a 64-bit syscall or a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls. CVE-2009-1072: nfsd in the Linux kernel did not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash option. CVE-2009-0835 The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle a 32-bit process making a 64-bit syscall or a 64-bit process making a 32-bit syscall, which allows local users to bypass intended access restrictions via crafted syscalls that are misinterpreted as stat or chmod. CVE-2009-1439: Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service or potential code execution via a long nativeFileSystem field in a Tree Connect response to an SMB mount request. This requires that kernel can be made to mount a &qt cifs &qt filesystem from a malicious CIFS server. CVE-2009-1337: The exit_notify function in kernel/exit.c in the Linux kernel did not restrict exit signals when the CAP_KILL capability is held, which allows local users to send an arbitrary signal to a process by running a program that modifies the exit_signal field and then uses an exec system call to launch a setuid application. CVE-2009-0859: The shm_get_stat function in ipc/shm.c in the shm subsystem in the Linux kernel, when CONFIG_SHMEM is disabled, misinterprets the data type of an inode, which allows local users to cause a denial of service via an SHM_INFO shmctl call, as demonstrated by running the ipcs program. CVE-2009-1242: The vmx_set_msr function in arch/x86/kvm/vmx.c in the VMX implementation in the KVM subsystem in the Linux kernel on the i386 platform allows guest OS users to cause a denial of service by setting the EFER_LME bit in the Extended Feature Enable Register model-specific register, which is specific to the x86_64 platform. CVE-2009-1265: Integer overflow in rose_sendmsg in the Linux kernel might allow attackers to obtain sensitive information via a large length value, which causes &qt garbage &qt memory to be sent. CVE-2009-0028: The clone system call in the Linux kernel allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit. CVE-2009-0675: The skfp_ioctl function in drivers/net/skfp/skfddi.c in the Linux kernel permits SKFP_CLR_STATS requests only when the CAP_NET_ADMIN capability is absent, instead of when this capability is present, which allows local users to reset the driver statistics, related to an &qt inverted logic &qt issue. CVE-2009-0676: The sock_getsockopt function in net/core/sock.c in the Linux kernel does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel memory via an SO_BSDCOMPAT getsockopt request. CVE-2009-0322: drivers/firmware/dell_rbu.c in the Linux kernel allows local users to cause a denial of service via a read system call that specifies zero bytes from the image_type or packet_size file in /sys/devices/platform/dell_rbu/. CVE-2009-0269: fs/ecryptfs/inode.c in the eCryptfs subsystem in the Linux kernel allows local users to cause a denial of service , or possibly have unspecified other impact, via a readlink call that results in an error, leading to use of a -1 return value as an array index. Some other non-security bugs were fixed, please see the RPM changelog.

Platform:
openSUSE 11.0
Product:
kernel
Reference:
SUSE-SA:2009:031
CVE-2009-0028
CVE-2009-0065
CVE-2009-0269
CVE-2009-0322
CVE-2009-0675
CVE-2009-0676
CVE-2009-0834
CVE-2009-0835
CVE-2009-0859
CVE-2009-1072
CVE-2009-1242
CVE-2009-1265
CVE-2009-1337
CVE-2009-1439
CVE-2009-1630
CVE-2009-1961
CVE    16
CVE-2009-0028
CVE-2009-0269
CVE-2009-0676
CVE-2009-0859
...
CPE    1
cpe:/o:opensuse:opensuse:11.0

© SecPod Technologies