Vulnerabilidad en kernel Linux (CVE-2009-2406)
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-119
Restricción de operaciones inapropiada dentro de los límites del búfer de la memoria
Fecha de publicación:
31/07/2009
Última modificación:
09/04/2025
Descripción
Desbordamiento de búfer basado en pila en la función parse_tag_11_packet en fs/ecryptfs/keystore.c en el subsistema eCryptfs del kernel de Linux anteriores a v2.6.30.4 permite a usuarios locales provocar una denegación de servicio (finalización del sistema) o posiblemente obtener mayores privilegios mediante vectores que utilizan un fichero eCryptfs modificado, relacionados con la no comprobación de que la longitud de la clave de firma en un paquete "Tag 11" es compatible con el tamaño del búfer de la clave de firma.
Impacto
Puntuación base 2.0
6.90
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:linux:kernel:2.6.24.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:linux:kernel:2.6.25.15:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.30.3 (incluyendo) | |
| cpe:2.3:o:linux:linux_kernel:2.2.6:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.0:*:64-bit_x86:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.0:*:itanium_ia64_montecito:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommit%3Bh%3D6352a29305373ae6196491e6d4669f301e26492e
- http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html
- http://risesecurity.org/advisories/RISE-2009002.txt
- http://secunia.com/advisories/35985
- http://secunia.com/advisories/36045
- http://secunia.com/advisories/36051
- http://secunia.com/advisories/36054
- http://secunia.com/advisories/36116
- http://secunia.com/advisories/36131
- http://secunia.com/advisories/37471
- http://www.debian.org/security/2009/dsa-1844
- http://www.debian.org/security/2009/dsa-1845
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.4
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A029
- http://www.redhat.com/support/errata/RHSA-2009-1193.html
- http://www.securityfocus.com/archive/1/505334/100/0/threaded
- http://www.securityfocus.com/archive/1/507985/100/0/threaded
- http://www.securityfocus.com/bid/35851
- http://www.securitytracker.com/id?1022663=
- http://www.ubuntu.com/usn/usn-807-1
- http://www.vmware.com/security/advisories/VMSA-2009-0016.html
- http://www.vupen.com/english/advisories/2009/2041
- http://www.vupen.com/english/advisories/2009/3316
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10072
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8246
- https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00166.html
- https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00223.html
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommit%3Bh%3D6352a29305373ae6196491e6d4669f301e26492e
- http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html
- http://risesecurity.org/advisories/RISE-2009002.txt
- http://secunia.com/advisories/35985
- http://secunia.com/advisories/36045
- http://secunia.com/advisories/36051
- http://secunia.com/advisories/36054
- http://secunia.com/advisories/36116
- http://secunia.com/advisories/36131
- http://secunia.com/advisories/37471
- http://www.debian.org/security/2009/dsa-1844
- http://www.debian.org/security/2009/dsa-1845
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.4
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A029
- http://www.redhat.com/support/errata/RHSA-2009-1193.html
- http://www.securityfocus.com/archive/1/505334/100/0/threaded
- http://www.securityfocus.com/archive/1/507985/100/0/threaded
- http://www.securityfocus.com/bid/35851
- http://www.securitytracker.com/id?1022663=
- http://www.ubuntu.com/usn/usn-807-1
- http://www.vmware.com/security/advisories/VMSA-2009-0016.html
- http://www.vupen.com/english/advisories/2009/2041
- http://www.vupen.com/english/advisories/2009/3316
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10072
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8246
- https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00166.html
- https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00223.html



