Lucene search

K
osvGoogleOSV:DSA-1865-1
HistoryAug 16, 2009 - 12:00 a.m.

fai-kernels linux-2.6 user-mode-linux - several vulnerabilities

2009-08-1600:00:00
Google
osv.dev
8

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.138 Low

EPSS

Percentile

94.8%

Several vulnerabilities have been discovered in the Linux kernel that
may lead to denial of service or privilege escalation. The Common
Vulnerabilities and Exposures project identifies the following
problems:

  • CVE-2009-1385
    Neil Horman discovered a missing fix from the e1000 network
    driver. A remote user may cause a denial of service by way of a
    kernel panic triggered by specially crafted frame sizes.
  • CVE-2009-1389
    Michael Tokarev discovered an issue in the r8169 network driver.
    Remote users on the same LAN may cause a denial of service by way
    of a kernel panic triggered by receiving a large size frame.
  • CVE-2009-1630
    Frank Filz discovered that local users may be able to execute
    files without execute permission when accessed via an nfs4 mount.
  • CVE-2009-1633
    Jeff Layton and Suresh Jayaraman fixed several buffer overflows in
    the CIFS filesystem which allow remote servers to cause memory
    corruption.
  • CVE-2009-2692
    Tavis Ormandy and Julien Tinnes discovered an issue with how the
    sendpage function is initialized in the proto_ops structure.
    Local users can exploit this vulnerability to gain elevated
    privileges.

For the oldstable distribution (etch), this problem has been fixed in
version 2.6.18.dfsg.1-24etch3.

The following matrix lists additional packages that were rebuilt for
compatibility with or to take advantage of this update:

Debian 4.0 (etch)
fai-kernels 1.17+etch.24etch3
user-mode-linux 2.6.18-1um-2etch.24etch3

We recommend that you upgrade your linux-2.6, fai-kernels, and
user-mode-linux packages.

Note: Debian carefully tracks all known security issues across every
linux kernel package in all releases under active security support.
However, given the high frequency at which low-severity security
issues are discovered in the kernel and the resource requirements of
doing an update, updates for lower priority issues will normally not
be released for all kernels at the same time. Rather, they will be
released in a staggered or “leap-frog” fashion.

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.138 Low

EPSS

Percentile

94.8%