Oval Definition:oval:org.mitre.oval:def:13505
Revision Date:2014-06-23Version:23
Title:DSA-1872-1 linux-2.6 -- denial of service/privilege escalation/information leak
Description:CVE-2009-2698 Herbert Xu discovered an issue in the way UDP tracks corking status that could allow local users to cause a denial of service. Tavis Ormandy and Julien Tinnes discovered that this issue could also be used by local users to gain elevated privileges. CVE-2009-2846 Michael Buesch noticed a typing issue in the eisa-eeprom driver for the hppa architecture. Local users could exploit this issue to gain access to restricted memory. CVE-2009-2847 Ulrich Drepper noticed an issue in the do_sigalstack routine on 64-bit systems. This issue allows local users to gain access to potentially sensitive memory on the kernel stack. CVE-2009-2848 Eric Dumazet discovered an issue in the execve path, where the clear_child_tid variable was not being properly cleared. Local users could exploit this issue to cause a denial of service. CVE-2009-2849 Neil Brown discovered an issue in the sysfs interface to md devices. When md arrays are not active, local users can exploit this vulnerability to cause a denial of service. For the oldstable distribution, this problem has been fixed in version 2.6.18.dfsg.1-24etch4. We recommend that you upgrade your linux-2.6, fai-kernels, and user-mode-linux packages. Note: Debian carefully tracks all known security issues across every linux kernel package in all releases under active security support. However, given the high frequency at which low-severity security issues are discovered in the kernel and the resource requirements of doing an update, updates for lower priority issues will normally not be released for all kernels at the same time. Rather, they will be released in a staggered or "leap-frog" fashion. The following matrix lists additional source packages that were rebuilt for compatability with or to take advantage of this update: Debian 4.0 fai-kernels 1.17+etch.24etch4 user-mode-linux 2.6.18-1um-2etch.24etch4
Family:unixClass:patch
Status:ACCEPTEDReference(s):CVE-2009-2698
CVE-2009-2846
CVE-2009-2847
CVE-2009-2848
CVE-2009-2849
DSA-1872-1
Platform(s):Debian GNU/Linux 4.0
Product(s):linux-2.6
Definition Synopsis
  • Debian GNU/Linux 4.0 is installed.
  • AND Architecture section
  • Architecture independent section
  • Installed architecture is all
  • AND Packages section
  • linux-support-2.6.18-6 DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-patch-debian-2.6.18 DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-source-2.6.18 DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-manual-2.6.18 DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-doc-2.6.18 DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-tree-2.6.18 DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR Architecture depended section
  • Installed architecture is s390
  • AND Packages section
  • linux-headers-2.6.18-6-vserver-s390x DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-headers-2.6.18-6-all DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-image-2.6.18-6-s390-tape DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-image-2.6.18-6-s390x DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-image-2.6.18-6-vserver-s390x DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-image-2.6.18-6-s390 DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-headers-2.6.18-6-vserver DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-headers-2.6.18-6-all-s390 DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-headers-2.6.18-6 DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-headers-2.6.18-6-s390x DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-headers-2.6.18-6-s390 DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR Architecture depended section
  • Installed architecture is amd64
  • AND Packages section
  • linux-image-2.6.18-6-xen-amd64 DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR fai-kernels DPKG is earlier than 1.17+etch.24etch4
  • OR linux-headers-2.6.18-6-all DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR xen-linux-system-2.6.18-6-xen-amd64 DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-image-2.6.18-6-amd64 DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-modules-2.6.18-6-xen-vserver-amd64 DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-image-2.6.18-6-xen-vserver-amd64 DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-headers-2.6.18-6-xen-amd64 DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR xen-linux-system-2.6.18-6-xen-vserver-amd64 DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-headers-2.6.18-6-amd64 DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-headers-2.6.18-6-xen DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-headers-2.6.18-6-xen-vserver-amd64 DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-headers-2.6.18-6-vserver DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-headers-2.6.18-6-vserver-amd64 DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-headers-2.6.18-6-all-amd64 DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-headers-2.6.18-6 DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-modules-2.6.18-6-xen-amd64 DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-headers-2.6.18-6-xen-vserver DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-image-2.6.18-6-vserver-amd64 DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR Supported platform section
  • Installed architecture is hppa
  • AND Packages section
  • linux-headers-2.6.18-6-parisc64 DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-headers-2.6.18-6-all DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-headers-2.6.18-6-parisc DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-image-2.6.18-6-parisc DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-headers-2.6.18-6-parisc-smp DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-image-2.6.18-6-parisc64-smp DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-image-2.6.18-6-parisc64 DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-headers-2.6.18-6 DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-headers-2.6.18-6-parisc64-smp DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-headers-2.6.18-6-all-hppa DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • OR linux-image-2.6.18-6-parisc-smp DPKG is earlier than 2.6.18.dfsg.1-24etch4
  • BACK