Oval Definition:oval:org.mitre.oval:def:8183
Revision Date:2014-06-23Version:21
Title:DSA-1630 linux-2.6 -- denial of service/information leak
Description:Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or arbitrary code execution. The Common Vulnerabilities and Exposures project identifies the following problems: Dirk Nehring discovered a vulnerability in the IPsec code that allows remote users to cause a denial of service by sending a specially crafted ESP packet. Tavis Ormandy discovered a vulnerability that allows local users to access uninitialised kernel memory, possibly leaking sensitive data. This issue is specific to the amd64-flavour kernel images. Andi Kleen discovered an issue where uninitialised kernel memory was being leaked to userspace during an exception. This issue may allow local users to gain access to sensitive data. Only the amd64-flavour Debian kernel images are affected. Alan Cox discovered an issue in multiple tty drivers that allows local users to trigger a denial of service (NULL pointer dereference) and possibly obtain elevated privileges. Gabriel Campana discovered an integer overflow in the sctp code that can be exploited by local users to cause a denial of service. Miklos Szeredi reported a missing privilege check in the do_change_type() function. This allows local, unprivileged users to change the properties of mount points. Tobias Klein reported a locally exploitable data leak in the snd_seq_oss_synth_make_info() function. This may allow local users to gain access to sensitive information. Zoltan Sogor discovered a coding error in the VFS that allows local users to exploit a kernel memory leak resulting in a denial of service.
Family:unixClass:patch
Status:ACCEPTEDReference(s):CVE-2007-6282
CVE-2008-0598
CVE-2008-2729
CVE-2008-2812
CVE-2008-2826
CVE-2008-2931
CVE-2008-3272
CVE-2008-3275
DSA-1630
Platform(s):Debian GNU/Linux 4.0
Product(s):linux-2.6
Definition Synopsis
  • Debian GNU/Linux 4.0 is installed.
  • AND Architecture section
  • Architecture independent section
  • Installed architecture is all
  • AND Packages section
  • linux-support-2.6.18-6 is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-patch-debian-2.6.18 is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-source-2.6.18 is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-manual-2.6.18 is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-tree-2.6.18 is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-doc-2.6.18 is earlier than 2.6.18.dfsg.1-22etch2
  • OR Architecture dependent section
  • Installed architecture is s390
  • AND Packages section
  • linux-headers-2.6.18-6-vserver-s390x is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-headers-2.6.18-6-s390 is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-headers-2.6.18-6-all is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-image-2.6.18-6-s390x is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-image-2.6.18-6-vserver-s390x is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-image-2.6.18-6-s390-tape is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-image-2.6.18-6-s390 is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-headers-2.6.18-6-vserver is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-headers-2.6.18-6-all-s390 is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-headers-2.6.18-6 is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-headers-2.6.18-6-s390x is earlier than 2.6.18.dfsg.1-22etch2
  • OR Architecture dependent section
  • Installed architecture is amd64
  • AND Packages section
  • linux-image-2.6.18-6-xen-amd64 is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-headers-2.6.18-6-all is earlier than 2.6.18.dfsg.1-22etch2
  • OR fai-kernels is earlier than 1.17+etch.22etch2
  • OR xen-linux-system-2.6.18-6-xen-amd64 is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-image-2.6.18-6-amd64 is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-image-2.6.18-6-vserver-amd64 is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-image-2.6.18-6-xen-vserver-amd64 is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-headers-2.6.18-6-xen-amd64 is earlier than 2.6.18.dfsg.1-22etch2
  • OR xen-linux-system-2.6.18-6-xen-vserver-amd64 is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-headers-2.6.18-6-amd64 is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-headers-2.6.18-6-xen is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-headers-2.6.18-6-xen-vserver-amd64 is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-headers-2.6.18-6-vserver is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-headers-2.6.18-6-vserver-amd64 is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-headers-2.6.18-6-all-amd64 is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-headers-2.6.18-6 is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-modules-2.6.18-6-xen-amd64 is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-headers-2.6.18-6-xen-vserver is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-modules-2.6.18-6-xen-vserver-amd64 is earlier than 2.6.18.dfsg.1-22etch2
  • OR Supported platform section
  • Installed architecture is hppa
  • AND Packages section
  • linux-headers-2.6.18-6-parisc64 is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-image-2.6.18-6-parisc64-smp is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-headers-2.6.18-6-all is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-headers-2.6.18-6-parisc is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-image-2.6.18-6-parisc64 is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-headers-2.6.18-6-parisc-smp is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-image-2.6.18-6-parisc is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-headers-2.6.18-6 is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-headers-2.6.18-6-parisc64-smp is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-headers-2.6.18-6-all-hppa is earlier than 2.6.18.dfsg.1-22etch2
  • OR linux-image-2.6.18-6-parisc-smp is earlier than 2.6.18.dfsg.1-22etch2
  • BACK