[ MDVSA-2009:135 ] kernel

Mandrivan turvallisuustiedotteiden tuoreimmat

[ MDVSA-2009:135 ] kernel

Uusi viestiKirjoittaja dude67 » 17 Kesä 2009, 22:43

_______________________________________________________________________

Package : kernel
Date : June 17, 2009
Affected: 2009.0
_______________________________________________________________________

Problem Description:

Some vulnerabilities were discovered and corrected in the Linux
2.6 kernel:

The selinux_ip_postroute_iptables_compat function in
security/selinux/hooks.c in the SELinux subsystem in the Linux kernel
before 2.6.27.22, and 2.6.28.x before 2.6.28.10, when compat_net is
enabled, omits calls to avc_has_perm for the (1) node and (2) port,
which allows local users to bypass intended restrictions on network
traffic. NOTE: this was incorrectly reported as an issue fixed in
2.6.27.21. (CVE-2009-1184)

The exit_notify function in kernel/exit.c in the Linux kernel
before 2.6.30-rc1 does not restrict exit signals when the
CAP_KILL capability is held, which allows local users to send an
arbitrary signal to a process by running a program that modifies the
exit_signal field and then uses an exec system call to launch a setuid
application. (CVE-2009-1337)

The (1) agp_generic_alloc_page and (2) agp_generic_alloc_pages
functions in drivers/char/agp/generic.c in the agp subsystem in the
Linux kernel before 2.6.30-rc3 do not zero out pages that may later
be available to a user-space process, which allows local users to
obtain sensitive information by reading these pages. (CVE-2009-1192)

The ABI in the Linux kernel 2.6.28 and earlier on s390, powerpc,
sparc64, and mips 64-bit platforms requires that a 32-bit argument in a
64-bit register was properly sign extended when sent from a user-mode
application, but cannot verify this, which allows local users to
cause a denial of service (crash) or possibly gain privileges via a
crafted system call. (CVE-2009-0029)

The __inet6_check_established function in net/ipv6/inet6_hashtables.c
in the Linux kernel before 2.6.29, when Network Namespace Support
(aka NET_NS) is enabled, allows remote attackers to cause a denial
of service (NULL pointer dereference and system crash) via vectors
involving IPv6 packets. (CVE-20090-1360)

The inode double locking code in fs/ocfs2/file.c in the Linux kernel
2.6.30 before 2.6.30-rc3, 2.6.27 before 2.6.27.24, 2.6.29 before
2.6.29.4, and possibly other versions down to 2.6.19 allows local
users to cause a denial of service (prevention of file creation
and removal) via a series of splice system calls that trigger a
deadlock between the generic_file_splice_write, splice_from_pipe,
and ocfs2_file_splice_write functions. (CVE-2009-1961)

Integer underflow in the e1000_clean_rx_irq function in
drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux
kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel,
and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote
attackers to cause a denial of service (panic) via a crafted frame
size. (CVE-2009-1385)

The nfs_permission function in fs/nfs/dir.c in the NFS client
implementation in the Linux kernel 2.6.29.3 and earlier, when
atomic_open is available, does not check execute (aka EXEC or
MAY_EXEC) permission bits, which allows local users to bypass
permissions and execute files, as demonstrated by files on an NFSv4
fileserver. (CVE-2009-1630)

Additionally, the kernel package was updated to the Linux upstream
stable version 2.6.27.24.

To update your kernel, please follow the directions located at:

http://www.mandriva.com/en/security/kernelupdate
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cg ... -2009-1184
http://cve.mitre.org/cgi-bin/cvename.cg ... -2009-1337
http://cve.mitre.org/cgi-bin/cvename.cg ... -2009-1192
http://cve.mitre.org/cgi-bin/cvename.cg ... -2009-1265
http://cve.mitre.org/cgi-bin/cvename.cg ... -2009-0029
http://cve.mitre.org/cgi-bin/cvename.cg ... -2009-1360
http://cve.mitre.org/cgi-bin/cvename.cg ... -2009-1961
http://cve.mitre.org/cgi-bin/cvename.cg ... -2009-1385
http://cve.mitre.org/cgi-bin/cvename.cg ... -2009-1630
_______________________________________________________________________
Kuva
1. Mageia-1 KDE4 x86_64 (& Win7 Pro) | desktop
2. Mageia-2 KDE4 (& Win7 Home Premium) | laptop Acer 7530
3. Mageia-1 KDE4 (& Win7 Starter) | Samsung NC-10 miniläppäri
4. Mageia-1 KDE4 | serverinä toimiva desktop
Luotettavaa Linux käyttöä jo Mandriva 2006.0:sta lähtien :)
Avatar
dude67
Site Admin
 
Viestit: 2256
Liittynyt: 27 Syys 2007, 16:58
Paikkakunta: Espoo

Paluu Mandrivan turvallisuustiedotteet

Paikallaolijat

Käyttäjiä lukemassa tätä aluetta: Ei rekisteröityneitä käyttäjiä ja 7 vierailijaa