SUSE-SA:2009:038 -- SUSE kernel remote denial of serviceID: oval:org.secpod.oval:def:400080 | Date: (C)2012-01-31 (M)2024-02-19 |
Class: PATCH | Family: unix |
The SUSE Linux Enterprise 11 and openSUSE 11.1 kernel was updated to fix various bugs and several security issues. It was also updated to the stable release 2.6.27.25. Following security issues were fixed: CVE-2009-1961: A local denial of service problem in the splice system call was fixed. CVE-2009-1389: A crash on r8169 network cards when receiving large packets was fixed. CVE-2009-1385: Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel, the e1000e driver in the Linux kernel, and Intel Wired Ethernet before 7.5.5 allows remote attackers to cause a denial of service via a crafted frame size. CVE-2009-1630: The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel, when atomic_open is available, does not check execute permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 file server