[Forgot Password]
Login  Register Subscribe

23631

 
 

122183

 
 

98060

 
 

909

 
 

79198

 
 

109

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SA:2009:038 -- SUSE kernel remote denial of service

ID: oval:org.secpod.oval:def:400080Date: (C)2012-01-31   (M)2017-10-04
Class: PATCHFamily: unix




The SUSE Linux Enterprise 11 and openSUSE 11.1 kernel was updated to fix various bugs and several security issues. It was also updated to the stable release 2.6.27.25. Following security issues were fixed: CVE-2009-1961: A local denial of service problem in the splice system call was fixed. CVE-2009-1389: A crash on r8169 network cards when receiving large packets was fixed. CVE-2009-1385: Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel, the e1000e driver in the Linux kernel, and Intel Wired Ethernet before 7.5.5 allows remote attackers to cause a denial of service via a crafted frame size. CVE-2009-1630: The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel, when atomic_open is available, does not check execute permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 file server

Platform:
openSUSE 11.1
Product:
kernel
Reference:
SUSE-SA:2009:038
CVE-2009-1385
CVE-2009-1389
CVE-2009-1630
CVE-2009-1961
CVE    4
CVE-2009-1630
CVE-2009-1385
CVE-2009-1961
CVE-2009-1389
...

© 2013 SecPod Technologies