[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SA:2010:010 -- SUSE kernel remote denial of service

ID: oval:org.secpod.oval:def:400026Date: (C)2012-01-31   (M)2024-02-19
Class: PATCHFamily: unix




This update of the openSUSE 11.2 kernel brings the kernel to version 2.6.31.12 and contains a lot of bug and security fixes. CVE-2010-0299: The permission of the devtmpfs root directory was incorrectly 1777 . If it was used, local attackers could escalate privileges. CVE-2009-3939: The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file. CVE-2010-0007: ebtables was lacking a CAP_NET_ADMIN check, making it possible for local unprivileged attackers to modify the network bridge management. CVE-2010-0003: An information leakage on fatal signals on x86_64 machines was fixed. CVE-2009-4141: A race condition in fasync handling could be used by local attackers to crash the machine or potentially execute code. CVE-2010-0006: The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.32.4, when network namespaces are enabled, allows remote attackers to cause a denial of service via an invalid IPv6 jumbogram. CVE-2009-4536: drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. CVE-2009-4538: drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets.

Platform:
openSUSE 11.2
Product:
kernel
Reference:
SUSE-SA:2010:010
CVE-2009-3939
CVE-2009-4141
CVE-2009-4536
CVE-2009-4538
CVE-2010-0003
CVE-2010-0006
CVE-2010-0007
CVE-2010-0299
CVE    8
CVE-2009-4536
CVE-2009-4141
CVE-2009-3939
CVE-2009-4538
...
CPE    1
cpe:/o:opensuse:opensuse:11.2

© SecPod Technologies