Oval Definition:oval:org.mitre.oval:def:8144
Revision Date:2014-06-23Version:20
Title:DSA-1687 linux-2.6 -- denial of service/privilege escalation
Description:Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation. The Common Vulnerabilities and Exposures project identifies the following problems: Tavis Ormandy reported a local DoS and potential privilege escalation in the Virtual Dynamic Shared Objects (vDSO) implementation. Eugene Teo reported a local DoS issue in the ext2 and ext3 filesystems. Local users who have been granted the privileges necessary to mount a filesystem would be able to craft a corrupted filesystem that causes the kernel to output error messages in an infinite loop. Milos Szeredi reported that the usage of splice() on files opened with O_APPEND allows users to write to the file at arbitrary offsets, enabling a bypass of possible assumed semantics of the O_APPEND flag. Vlad Yasevich reported an issue in the SCTP subsystem that may allow remote users to cause a local DoS by triggering a kernel oops. Eric Sesterhenn reported a local DoS issue in the hfsplus filesystem. Local users who have been granted the privileges necessary to mount a filesystem would be able to craft a corrupted filesystem that causes the kernel to overrun a buffer, resulting in a system oops or memory corruption. Eric Sesterhenn reported a local DoS issue in the hfsplus filesystem. Local users who have been granted the privileges necessary to mount a filesystem would be able to craft a corrupted filesystem that results in a kernel oops due to an unchecked return value. Eric Sesterhenn reported a local DoS issue in the hfs filesystem. Local users who have been granted the privileges necessary to mount a filesystem would be able to craft a filesystem with a corrupted catalog name length, resulting in a system oops or memory corruption. Andrea Bittau reported a DoS issue in the unix socket subsystem that allows a local user to cause memory corruption, resulting in a kernel panic. Hugo Dias reported a DoS condition in the ATM subsystem that can be triggered by a local user by calling the svc_listen function twice on the same socket and reading /proc/net/atm/*vc. Al Viro reported race conditions in the inotify subsystem that may allow local users to acquire elevated privileges. Dann Frazier reported a DoS condition that allows local users to cause the out of memory handler to kill off privileged processes or trigger soft lockups due to a starvation issue in the unix socket subsystem.
Family:unixClass:patch
Status:ACCEPTEDReference(s):CVE-2008-3527
CVE-2008-3528
CVE-2008-4554
CVE-2008-4576
CVE-2008-4933
CVE-2008-4934
CVE-2008-5025
CVE-2008-5029
CVE-2008-5079
CVE-2008-5182
CVE-2008-5300
DSA-1687
Platform(s):Debian GNU/Linux 4.0
Product(s):linux-2.6
Definition Synopsis
  • Debian GNU/Linux 4.0 is installed.
  • AND Architecture section
  • Architecture independent section
  • Installed architecture is all
  • AND Packages section
  • linux-support-2.6.18-6 is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-patch-debian-2.6.18 is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-source-2.6.18 is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-manual-2.6.18 is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-tree-2.6.18 is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-doc-2.6.18 is earlier than 2.6.18.dfsg.1-23etch1
  • OR Architecture dependent section
  • Installed architecture is s390
  • AND Packages section
  • linux-headers-2.6.18-6-all is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-headers-2.6.18-6-vserver-s390x is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-headers-2.6.18-6-s390 is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-image-2.6.18-6-s390-tape is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-image-2.6.18-6-s390x is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-image-2.6.18-6-vserver-s390x is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-image-2.6.18-6-s390 is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-headers-2.6.18-6-vserver is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-headers-2.6.18-6-all-s390 is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-headers-2.6.18-6 is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-headers-2.6.18-6-s390x is earlier than 2.6.18.dfsg.1-23etch1
  • OR Architecture dependent section
  • Installed architecture is amd64
  • AND Packages section
  • linux-image-2.6.18-6-xen-amd64 is earlier than 2.6.18.dfsg.1-23etch1
  • OR fai-kernels is earlier than 1.17+etch.23etch1
  • OR linux-headers-2.6.18-6-all is earlier than 2.6.18.dfsg.1-23etch1
  • OR xen-linux-system-2.6.18-6-xen-amd64 is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-image-2.6.18-6-amd64 is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-modules-2.6.18-6-xen-vserver-amd64 is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-image-2.6.18-6-xen-vserver-amd64 is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-headers-2.6.18-6-xen-amd64 is earlier than 2.6.18.dfsg.1-23etch1
  • OR xen-linux-system-2.6.18-6-xen-vserver-amd64 is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-headers-2.6.18-6-amd64 is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-headers-2.6.18-6-xen is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-headers-2.6.18-6-xen-vserver-amd64 is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-modules-2.6.18-6-xen-amd64 is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-headers-2.6.18-6-vserver-amd64 is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-headers-2.6.18-6-all-amd64 is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-headers-2.6.18-6 is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-headers-2.6.18-6-vserver is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-headers-2.6.18-6-xen-vserver is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-image-2.6.18-6-vserver-amd64 is earlier than 2.6.18.dfsg.1-23etch1
  • OR Supported platform section
  • Installed architecture is hppa
  • AND Packages section
  • linux-headers-2.6.18-6-parisc64 is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-headers-2.6.18-6-all is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-image-2.6.18-6-parisc64-smp is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-image-2.6.18-6-parisc is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-headers-2.6.18-6-parisc is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-headers-2.6.18-6-all-hppa is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-headers-2.6.18-6-parisc-smp is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-headers-2.6.18-6-parisc64-smp is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-headers-2.6.18-6 is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-image-2.6.18-6-parisc64 is earlier than 2.6.18.dfsg.1-23etch1
  • OR linux-image-2.6.18-6-parisc-smp is earlier than 2.6.18.dfsg.1-23etch1
  • BACK