Lucene search

K
osvGoogleOSV:DSA-1809-1
HistoryJun 01, 2009 - 12:00 a.m.

linux-2.6 user-mode-linux - several vulnerabilities

2009-06-0100:00:00
Google
osv.dev
30

EPSS

0.002

Percentile

56.0%

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a denial of service, or privilege escalation. The Common
Vulnerabilities and Exposures project identifies the following
problems:

  • CVE-2009-1630
    Frank Filz discovered that local users may be able to execute
    files without execute permission when accessed via an nfs4 mount.
  • CVE-2009-1633
    Jeff Layton and Suresh Jayaraman fixed several buffer overflows in
    the CIFS filesystem which allow remote servers to cause memory
    corruption.
  • CVE-2009-1758
    Jan Beulich discovered an issue in Xen where local guest users may
    cause a denial of service (oops).

This update also fixes a regression introduced by the fix for
CVE-2009-1184
in 2.6.26-15lenny3. This prevents a boot time panic on systems with SELinux
enabled.

For the oldstable distribution (etch), these problems, where
applicable, will be fixed in future updates to linux-2.6 and
linux-2.6.24.

For the stable distribution (lenny), these problems have been fixed in
version 2.6.26-15lenny3.

We recommend that you upgrade your linux-2.6 and user-mode-linux
packages.

Note: Debian carefully tracks all known security issues across every
linux kernel package in all releases under active security support.
However, given the high frequency at which low-severity security
issues are discovered in the kernel and the resource requirements of
doing an update, updates for lower priority issues will normally not
be released for all kernels at the same time. Rather, they will be
released in a staggered or “leap-frog” fashion.