_______________________________________________________________________
Package : kernel
Date : May 19, 2009
Affected: 2009.0
_______________________________________________________________________
Problem Description:
Some vulnerabilities were discovered and corrected in the Linux
2.6 kernel:
The clone system call in the Linux kernel 2.6.28 and earlier allows
local users to send arbitrary signals to a parent process from an
unprivileged child process by launching an additional child process
with the CLONE_PARENT flag, and then letting this new process
exit. (CVE-2009-0028)
fs/ecryptfs/inode.c in the eCryptfs subsystem in the Linux kernel
before 2.6.28.1 allows local users to cause a denial of service (fault
or memory corruption), or possibly have unspecified other impact,
via a readlink call that results in an error, leading to use of a -1
return value as an array index. (CVE-2009-0269)
The audit_syscall_entry function in the Linux kernel 2.6.28.7
and earlier on the x86_64 platform does not properly handle (1)
a 32-bit process making a 64-bit syscall or (2) a 64-bit process
making a 32-bit syscall, which allows local users to bypass certain
syscall audit configurations via crafted syscalls, a related issue
to CVE-2009-0342 and CVE-2009-0343. (CVE-2009-0834)
The __secure_computing function in kernel/seccomp.c in the seccomp
subsystem in the Linux kernel 2.6.28.7 and earlier on the x86_64
platform, when CONFIG_SECCOMP is enabled, does not properly handle
(1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process
making a 32-bit syscall, which allows local users to bypass intended
access restrictions via crafted syscalls that are misinterpreted
as (a) stat or (b) chmod, a related issue to CVE-2009-0342 and
CVE-2009-0343. (CVE-2009-0835)
The selinux_ip_postroute_iptables_compat function in
security/selinux/hooks.c in the SELinux subsystem in the Linux kernel
before 2.6.27.22, and 2.6.28.x before 2.6.28.10, when compat_net is
enabled, omits calls to avc_has_perm for the (1) node and (2) port,
which allows local users to bypass intended restrictions on network
traffic. NOTE: this was incorrectly reported as an issue fixed in
2.6.27.21. (CVE-2009-1184)
Additionally, along with other things, this kernel update adds support
for D-Link DWM 652 3.5G, some Intel gigabit network chipsets, Avermedia
PCI pure analog (M135A), fixes a bug causing SQLite performance
regression, and has some updated ALSA drivers. Check the package
changelog for details.
To update your kernel, please follow the directions located at:
http://www.mandriva.com/en/security/kernelupdate
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cg ... -2009-0028
http://cve.mitre.org/cgi-bin/cvename.cg ... -2009-0269
http://cve.mitre.org/cgi-bin/cvename.cg ... -2009-0834
http://cve.mitre.org/cgi-bin/cvename.cg ... -2009-0835
http://cve.mitre.org/cgi-bin/cvename.cg ... -2009-1184
https://qa.mandriva.com/43441
_______________________________________________________________________