[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2009:135 -- Mandriva kernel

ID: oval:org.secpod.oval:def:301231Date: (C)2012-01-07   (M)2024-02-19
Class: PATCHFamily: unix




Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel: The selinux_ip_postroute_iptables_compat function in security/selinux/hooks.c in the SELinux subsystem in the Linux kernel before 2.6.27.22, and 2.6.28.x before 2.6.28.10, when compat_net is enabled, omits calls to avc_has_perm for the node and port, which allows local users to bypass intended restrictions on network traffic. NOTE: this was incorrectly reported as an issue fixed in 2.6.27.21. The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1 does not restrict exit signals when the CAP_KILL capability is held, which allows local users to send an arbitrary signal to a process by running a program that modifies the exit_signal field and then uses an exec system call to launch a setuid application. The agp_generic_alloc_page and agp_generic_alloc_pages functions in drivers/char/agp/generic.c in the agp subsystem in the Linux kernel before 2.6.30-rc3 do not zero out pages that may later be available to a user-space process, which allows local users to obtain sensitive information by reading these pages. The ABI in the Linux kernel 2.6.28 and earlier on s390, powerpc, sparc64, and mips 64-bit platforms requires that a 32-bit argument in a 64-bit register was properly sign extended when sent from a user-mode application, but cannot verify this, which allows local users to cause a denial of service or possibly gain privileges via a crafted system call. The __inet6_check_established function in net/ipv6/inet6_hashtables.c in the Linux kernel before 2.6.29, when Network Namespace Support is enabled, allows remote attackers to cause a denial of service via vectors involving IPv6 packets. The inode double locking code in fs/ocfs2/file.c in the Linux kernel 2.6.30 before 2.6.30-rc3, 2.6.27 before 2.6.27.24, 2.6.29 before 2.6.29.4, and possibly other versions down to 2.6.19 allows local users to cause a denial of service via a series of splice system calls that trigger a deadlock between the generic_file_splice_write, splice_from_pipe, and ocfs2_file_splice_write functions. Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet before 7.5.5 allows remote attackers to cause a denial of service via a crafted frame size. The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver. Additionally, the kernel package was updated to the Linux upstream stable version 2.6.27.24

Platform:
Mandriva Linux 2009.0
Product:
kernel
Reference:
MDVSA-2009:135
CVE-2009-1630
CVE-2009-1385
CVE-2009-1961
CVE-2009-1360
CVE-2009-0029
CVE-2009-1265
CVE-2009-1192
CVE-2009-1337
CVE-2009-1184
CVE    9
CVE-2009-0029
CVE-2009-1265
CVE-2009-1385
CVE-2009-1630
...
CPE    1
cpe:/o:mandriva:linux:2009.0

© SecPod Technologies