Summary
The remote host is missing an update to linux-2.6
announced via advisory DSA 1809-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201809-1
Insight
Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service, or privilege escalation. The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2009-1630
Frank Filz discovered that local users may be able to execute files without execute permission when accessed via an nfs4 mount.
CVE-2009-1633
Jeff Layton and Suresh Jayaraman fixed several buffer overflows in the CIFS filesystem which allow remote servers to cause memory corruption.
CVE-2009-1758
Jan Beulich discovered an issue in Xen where local guest users may cause a denial of service (oops).
This update also fixes a regression introduced by the fix for CVE-2009-1184 in 2.6.26-15lenny3. This prevents a boot time panic on systems with SELinux enabled.
For the stable distribution (lenny), these problems have been fixed in version 2.6.26-15lenny3.
For the oldstable distribution (etch), these problems, where applicable, will be fixed in future updates to linux-2.6 and linux-2.6.24.
We recommend that you upgrade your linux-2.6 and user-mode-linux
Severity
Classification
-
CVE CVE-2009-1184, CVE-2009-1630, CVE-2009-1633, CVE-2009-1758 -
CVSS Base Score: 7.1
AV:N/AC:M/Au:N/C:N/I:N/A:C
Related Vulnerabilities