diff options
Diffstat (limited to 'metadata/glsa/glsa-200907-08.xml')
-rw-r--r-- | metadata/glsa/glsa-200907-08.xml | 83 |
1 files changed, 83 insertions, 0 deletions
diff --git a/metadata/glsa/glsa-200907-08.xml b/metadata/glsa/glsa-200907-08.xml new file mode 100644 index 000000000000..0bbc66b42ed7 --- /dev/null +++ b/metadata/glsa/glsa-200907-08.xml @@ -0,0 +1,83 @@ +<?xml version="1.0" encoding="utf-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="200907-08"> + <title>Multiple Ralink wireless drivers: Execution of arbitrary code</title> + <synopsis> + An integer overflow in multiple Ralink wireless drivers might lead to the + execution of arbitrary code with elevated privileges. + </synopsis> + <product type="ebuild">rt2400 rt2500 rt2570 rt61 ralink-rt61</product> + <announced>2009-07-12</announced> + <revised count="01">2009-07-12</revised> + <bug>257023</bug> + <access>remote</access> + <affected> + <package name="net-wireless/rt2400" auto="yes" arch="*"> + <vulnerable range="le">1.2.2_beta3</vulnerable> + </package> + <package name="net-wireless/rt2500" auto="yes" arch="*"> + <vulnerable range="le">1.1.0_pre2007071515</vulnerable> + </package> + <package name="net-wireless/rt2570" auto="yes" arch="*"> + <vulnerable range="le">20070209</vulnerable> + </package> + <package name="net-wireless/rt61" auto="yes" arch="*"> + <vulnerable range="le">1.1.0_beta2</vulnerable> + </package> + <package name="net-wireless/ralink-rt61" auto="yes" arch="*"> + <vulnerable range="le">1.1.1.0</vulnerable> + </package> + </affected> + <background> + <p> + All listed packages are external kernel modules that provide drivers + for multiple Ralink devices. ralink-rt61 is released by ralinktech.com, + the other packages by the rt2x00.serialmonkey.com project. + </p> + </background> + <description> + <p> + Aviv reported an integer overflow in multiple Ralink wireless card + drivers when processing a probe request packet with a long SSID, + possibly related to an integer signedness error. + </p> + </description> + <impact type="high"> + <p> + A physically proximate attacker could send specially crafted packets to + a user who has wireless networking enabled, possibly resulting in the + execution of arbitrary code with root privileges. + </p> + </impact> + <workaround> + <p> + Unload the kernel modules. + </p> + </workaround> + <resolution> + <p> + All external kernel modules have been masked and we recommend that + users unmerge those drivers. The Linux mainline kernel has equivalent + support for these devices and the vulnerability has been resolved in + stable versions of sys-kernel/gentoo-sources. + </p> + <code> + # emerge --unmerge "net-wireless/rt2400" + # emerge --unmerge "net-wireless/rt2500" + # emerge --unmerge "net-wireless/rt2570" + # emerge --unmerge "net-wireless/rt61" + # emerge --unmerge "net-wireless/ralink-rt61"</code> + </resolution> + <references> + <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0282">CVE-2009-0282</uri> + </references> + <metadata tag="requester" timestamp="2009-07-09T18:18:38Z"> + rbu + </metadata> + <metadata tag="submitter" timestamp="2009-07-09T18:30:24Z"> + rbu + </metadata> + <metadata tag="bugReady" timestamp="2009-07-12T15:41:07Z"> + rbu + </metadata> +</glsa> |