Oval Definition:oval:org.mitre.oval:def:7480
Revision Date:2014-06-23Version:21
Title:DSA-1996 linux-2.6 -- privilege escalation/denial of service/sensitive memory leak
Description:Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service, sensitive memory leak or privilege escalation. The Common Vulnerabilities and Exposures project identifies the following problems: Joseph Malicki reported that the dbg_lvl sysfs attribute for the megaraid_sas device driver had world-writable permissions, permitting local users to modify logging settings. Lennert Buytenhek reported a race in the mac80211 subsystem that may allow remote users to cause a denial of service on a system connected to the same wireless network. Fabian Yamaguchi reported issues in the e1000 and e1000e drivers for Intel gigabit network adapters which allow remote users to bypass packet filters using specially crafted ethernet frames. Andi Kleen reported a defect which allows local users to gain read access to memory reachable by the kernel when the print-fatal-signals option is enabled. This option is disabled by default. Florian Westphal reported a lack of capability checking in the ebtables netfilter subsystem. If the ebtables module is loaded, local users can add and modify ebtables rules. Al Viro reported several issues with the mmap/mremap system calls that allow local users to cause a denial of service or obtain elevated privileges. Gleb Natapov discovered issues in the KVM subsystem where missing permission checks permit a user in a guest system to denial of service a guest or gain escalated privileges with the guest. Mathias Krause reported an issue with the load_elf_binary code on the amd64 flavor kernels that allows local users to cause a denial of service. Marcelo Tosatti fixed an issue in the PIT emulation code in the KVM subsystem that allows privileged users in a guest domain to cause a denial of service of the host system. Sebastian Krahmer discovered an issue in the netlink connector subsystem that permits local users to allocate large amounts of system memory resulting in a denial of service. Ramon de Carvalho Valle discovered an issue in the sys_move_pages interface, limited to amd64, ia64 and powerpc64 flavors in Debian. Local users can exploit this issue to cause a denial of service or gain access to sensitive kernel memory.
Family:unixClass:patch
Status:ACCEPTEDReference(s):CVE-2009-3939
CVE-2009-4027
CVE-2009-4536
CVE-2009-4538
CVE-2010-0003
CVE-2010-0007
CVE-2010-0291
CVE-2010-0298
CVE-2010-0306
CVE-2010-0307
CVE-2010-0309
CVE-2010-0410
CVE-2010-0415
DSA-1996
Platform(s):Debian GNU/Linux 5.0
Product(s):linux-2.6
Definition Synopsis
  • Debian GNU/Linux 5.0 is installed
  • AND Architecture section
  • Architecture independent section
  • Installed architecture is all
  • AND Packages section
  • linux-patch-debian-2.6.26 is earlier than 2.6.26-21lenny1
  • OR linux-support-2.6.26-2 is earlier than 2.6.26-21lenny3
  • OR linux-doc-2.6.26 is earlier than 2.6.26-21lenny1
  • OR linux-tree-2.6.26 is earlier than 2.6.26-21lenny1
  • OR linux-source-2.6.26 is earlier than 2.6.26-21lenny1
  • OR linux-manual-2.6.26 is earlier than 2.6.26-21lenny1
  • OR Architecture dependent section
  • Installed architecture is s390
  • AND Packages section
  • linux-headers-2.6.26-2-all is earlier than 2.6.26-21lenny3
  • OR linux-image-2.6.26-2-vserver-s390x is earlier than 2.6.26-21lenny3
  • OR linux-image-2.6.26-2-s390 is earlier than 2.6.26-21lenny2
  • OR linux-headers-2.6.26-2-s390 is earlier than 2.6.26-21lenny3
  • OR linux-image-2.6.26-2-s390-tape is earlier than 2.6.26-21lenny3
  • OR linux-headers-2.6.26-2-all-s390 is earlier than 2.6.26-21lenny1
  • OR linux-headers-2.6.26-2-vserver-s390x is earlier than 2.6.26-21lenny1
  • OR linux-headers-2.6.26-2-common-vserver is earlier than 2.6.26-21lenny1
  • OR linux-libc-dev is earlier than 2.6.26-21lenny2
  • OR linux-image-2.6.26-2-s390x is earlier than 2.6.26-21lenny2
  • OR linux-headers-2.6.26-2-common is earlier than 2.6.26-21lenny2
  • OR linux-headers-2.6.26-2-s390x is earlier than 2.6.26-21lenny2
  • OR Architecture dependent section
  • Installed architecture is amd64
  • AND Packages section
  • xen-linux-system-2.6.26-2-xen-amd64 is earlier than 2.6.26-21lenny2
  • OR linux-headers-2.6.26-2-all is earlier than 2.6.26-21lenny2
  • OR linux-headers-2.6.26-2-openvz-amd64 is earlier than 2.6.26-21lenny3
  • OR linux-headers-2.6.26-2-common-vserver is earlier than 2.6.26-21lenny3
  • OR linux-image-2.6.26-2-openvz-amd64 is earlier than 2.6.26-21lenny3
  • OR linux-image-2.6.26-2-amd64 is earlier than 2.6.26-21lenny3
  • OR linux-headers-2.6.26-2-common-openvz is earlier than 2.6.26-21lenny3
  • OR linux-modules-2.6.26-2-xen-amd64 is earlier than 2.6.26-21lenny3
  • OR linux-headers-2.6.26-2-all-amd64 is earlier than 2.6.26-21lenny3
  • OR linux-image-2.6.26-2-xen-amd64 is earlier than 2.6.26-21lenny2
  • OR linux-headers-2.6.26-2-common-xen is earlier than 2.6.26-21lenny2
  • OR linux-libc-dev is earlier than 2.6.26-21lenny2
  • OR linux-headers-2.6.26-2-xen-amd64 is earlier than 2.6.26-21lenny3
  • OR linux-headers-2.6.26-2-amd64 is earlier than 2.6.26-21lenny2
  • OR linux-headers-2.6.26-2-common is earlier than 2.6.26-21lenny3
  • OR linux-image-2.6.26-2-vserver-amd64 is earlier than 2.6.26-21lenny3
  • OR linux-headers-2.6.26-2-vserver-amd64 is earlier than 2.6.26-21lenny3
  • OR Supported platform section
  • Installed architecture is hppa
  • AND Packages section
  • linux-headers-2.6.26-2-all is earlier than 2.6.26-21lenny3
  • OR linux-headers-2.6.26-2-parisc is earlier than 2.6.26-21lenny2
  • OR linux-image-2.6.26-2-parisc64 is earlier than 2.6.26-21lenny3
  • OR linux-image-2.6.26-2-parisc is earlier than 2.6.26-21lenny2
  • OR linux-headers-2.6.26-2-parisc-smp is earlier than 2.6.26-21lenny3
  • OR linux-headers-2.6.26-2-all-hppa is earlier than 2.6.26-21lenny2
  • OR linux-image-2.6.26-2-parisc-smp is earlier than 2.6.26-21lenny2
  • OR linux-headers-2.6.26-2-parisc64-smp is earlier than 2.6.26-21lenny2
  • OR linux-headers-2.6.26-2-parisc64 is earlier than 2.6.26-21lenny2
  • OR linux-libc-dev is earlier than 2.6.26-21lenny2
  • OR linux-image-2.6.26-2-parisc64-smp is earlier than 2.6.26-21lenny2
  • OR linux-headers-2.6.26-2-common is earlier than 2.6.26-21lenny3
  • BACK