[go: up one dir, main page]

|
|
Log in / Subscribe / Register

kernel: multiple vulnerabilities

Package(s):kernel CVE #(s):CVE-2006-6304 CVE-2009-3556 CVE-2009-4020 CVE-2009-4141 CVE-2009-4272
Created:January 20, 2010 Updated:November 5, 2012
Description:

From the Red Hat advisory:

the RHSA-2009:0225 update introduced a rewrite attack flaw in the do_coredump() function. A local attacker able to guess the file name a process is going to dump its core to, prior to the process crashing, could use this flaw to append data to the dumped core file. This issue only affects systems that have "/proc/sys/fs/suid_dumpable" set to 2 (the default value is 0). (CVE-2006-6304, Moderate)

The fix for CVE-2006-6304 changes the expected behavior: With suid_dumpable set to 2, the core file will not be recorded if the file already exists. For example, core files will not be overwritten on subsequent crashes of processes whose core files map to the same name.

the RHBA-2008:0314 update introduced N_Port ID Virtualization (NPIV) support in the qla2xxx driver, resulting in two new sysfs pseudo files, "/sys/class/scsi_host/[a qla2xxx host]/vport_create" and "vport_delete". These two files were world-writable by default, allowing a local user to change SCSI host attributes. This flaw only affects systems using the qla2xxx driver and NPIV capable hardware. (CVE-2009-3556, Moderate)

a buffer overflow flaw was found in the hfs_bnode_read() function in the HFS file system implementation. This could lead to a denial of service if a user browsed a specially-crafted HFS file system, for example, by running "ls". (CVE-2009-4020, Low)

Tavis Ormandy discovered a deficiency in the fasync_helper() implementation. This could allow a local, unprivileged user to leverage a use-after-free of locked, asynchronous file descriptors to cause a denial of service or privilege escalation. (CVE-2009-4141, Important)

the Parallels Virtuozzo Containers team reported the RHSA-2009:1243 update introduced two flaws in the routing implementation. If an attacker was able to cause a large enough number of collisions in the routing hash table (via specially-crafted packets) for the emergency route flush to trigger, a deadlock could occur. Secondly, if the kernel routing cache was disabled, an uninitialized pointer would be left behind after a route lookup, leading to a kernel panic. (CVE-2009-4272, Important)

Alerts:
SUSE SUSE-SU-2015:0812-1 kernel 2015-04-30
openSUSE openSUSE-SU-2012:1439-1 kernel 2012-11-05
Oracle ELSA-2012-1323 kernel 2012-10-04
Oracle ELSA-2012-1323 kernel 2012-10-03
CentOS CESA-2012:1323 kernel 2012-10-03
Red Hat RHSA-2012:1323-01 kernel 2012-10-02
openSUSE openSUSE-SU-2012:0812-1 kernel 2012-07-03
openSUSE openSUSE-SU-2012:0799-1 kernel 2012-06-28
openSUSE openSUSE-SU-2012:0781-1 kernel 2012-06-22
SUSE SUSE-SA:2010:036 kernel 2010-09-01
SuSE SUSE-SA:2010:023 kernel 2010-05-06
SuSE SUSE-SA:2010:019 kernel 2010-03-30
Red Hat RHSA-2010:0161-01 kernel-rt 2010-03-23
Red Hat RHSA-2010:0149-01 kernel 2010-03-16
SuSE SUSE-SA:2010:016 kernel 2010-03-08
Ubuntu USN-894-1 linux, linux-source-2.6.15 2010-02-05
Red Hat RHSA-2010:0076-01 kernel 2010-02-02
Debian DSA-2004-1 linux-2.6.24 2010-02-27
Debian DSA-2003-1 linux-2.6 2010-02-22
CentOS CESA-2010:0046 kernel 2010-01-20
Red Hat RHSA-2010:0046-01 kernel 2010-01-19
SuSE SUSE-SA:2010:010 kernel 2010-02-08
SuSE SUSE-SA:2010:009 kernel 2010-02-05
Fedora FEDORA-2010-1500 kernel 2010-02-05
CentOS CESA-2010:0076 kernel 2010-02-04

to post comments

kernel: multiple vulnerabilities

Posted Feb 17, 2010 18:31 UTC (Wed) by oak (guest, #2786) [Link]

"The fix for CVE-2006-6304 changes the expected behavior: With
suid_dumpable set to 2, the core file will not be recorded if the file
already exists."

I guess this handles properly also the case of "|my-core-handler"
core_pattern?


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds