fai-kernels linux-2.6 user-mode-linux - several vulnerabilities


Several vulnerabilities have been discovered in the Linux kernel that may lead to denial of service or privilege escalation. The Common Vulnerabilities and Exposures project identifies the following problems: * [CVE-2009-1385](https://security-tracker.debian.org/tracker/CVE-2009-1385) Neil Horman discovered a missing fix from the e1000 network driver. A remote user may cause a denial of service by way of a kernel panic triggered by specially crafted frame sizes. * [CVE-2009-1389](https://security-tracker.debian.org/tracker/CVE-2009-1389) Michael Tokarev discovered an issue in the r8169 network driver. Remote users on the same LAN may cause a denial of service by way of a kernel panic triggered by receiving a large size frame. * [CVE-2009-1630](https://security-tracker.debian.org/tracker/CVE-2009-1630) Frank Filz discovered that local users may be able to execute files without execute permission when accessed via an nfs4 mount. * [CVE-2009-1633](https://security-tracker.debian.org/tracker/CVE-2009-1633) Jeff Layton and Suresh Jayaraman fixed several buffer overflows in the CIFS filesystem which allow remote servers to cause memory corruption. * [CVE-2009-2692](https://security-tracker.debian.org/tracker/CVE-2009-2692) Tavis Ormandy and Julien Tinnes discovered an issue with how the sendpage function is initialized in the proto\_ops structure. Local users can exploit this vulnerability to gain elevated privileges. For the oldstable distribution (etch), this problem has been fixed in version 2.6.18.dfsg.1-24etch3. The following matrix lists additional packages that were rebuilt for compatibility with or to take advantage of this update: | | Debian 4.0 (etch) | | --- | --- | | fai-kernels | 1.17+etch.24etch3 | | user-mode-linux | 2.6.18-1um-2etch.24etch3 | We recommend that you upgrade your linux-2.6, fai-kernels, and user-mode-linux packages. Note: Debian carefully tracks all known security issues across every linux kernel package in all releases under active security support. However, given the high frequency at which low-severity security issues are discovered in the kernel and the resource requirements of doing an update, updates for lower priority issues will normally not be released for all kernels at the same time. Rather, they will be released in a staggered or "leap-frog" fashion.

Affected Software

CPE Name Name Version
fai-kernels 1.17
fai-kernels 1.17+etch.13etch3
fai-kernels 1.17+etch.13etch4
fai-kernels 1.17+etch.13etch5
fai-kernels 1.17+etch.13etch6
fai-kernels 1.17+etch.16
fai-kernels 1.17+etch.17
fai-kernels 1.17+etch.17etch1
fai-kernels 1.17+etch.18etch1
fai-kernels 1.17+etch.18etch2
fai-kernels 1.17+etch.18etch3
fai-kernels 1.17+etch.18etch4
fai-kernels 1.17+etch.18etch5
fai-kernels 1.17+etch.18etch6
fai-kernels 1.17+etch.21
fai-kernels 1.17+etch.22etch1
fai-kernels 1.17+etch.22etch2
fai-kernels 1.17+etch.22etch3
fai-kernels 1.17+etch.23
fai-kernels 1.17+etch.23etch1
fai-kernels 1.17+etch.24
fai-kernels 1.17+etch.24etch2
fai-kernels 1.17+etch1
fai-kernels 1.17+etch2
fai-kernels 1.17+etch3
fai-kernels 1.17+etch4
fai-kernels 1.17+etch5
fai-kernels 1.17etch1