Oval Definition:oval:org.mitre.oval:def:8234
Revision Date:2014-06-23Version:20
Title:DSA-1636 linux-2.6.24 -- denial of service/information leak
Description:Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or leak sensitive data. The Common Vulnerabilities and Exposures project identifies the following problems: Tobias Klein reported a locally exploitable data leak in the snd_seq_oss_synth_make_info() function. This may allow local users to gain access to sensitive information. Zoltan Sogor discovered a coding error in the VFS that allows local users to exploit a kernel memory leak resulting in a denial of service. Eugene Teo reported an integer overflow in the DCCP subsystem that may allow remote attackers to cause a denial of service in the form of a kernel panic. Eugene Teo reported a missing bounds check in the SCTP subsystem. By exploiting an integer overflow in the SCTP_AUTH_KEY handling code, remote attackers may be able to cause a denial of service in the form of a kernel panic. Kel Modderman reported an issue in the tmpfs filesystem that allows local users to crash a system by triggering a kernel BUG() assertion. Alexey Dobriyan discovered an off-by-one-error in the iov_iter_advance function which can be exploited by local users to crash a system, resulting in a denial of service. Vlad Yasevich reported several NULL pointer reference conditions in the SCTP subsystem that can be triggered by entering sctp-auth codepaths when the AUTH feature is inactive. This may allow attackers to cause a denial of service condition via a system panic. Johann Dahm and David Richter reported an issue in the nfsd subsystem that may allow remote attackers to cause a denial of service via a buffer overflow.
Family:unixClass:patch
Status:ACCEPTEDReference(s):CVE-2008-3272
CVE-2008-3275
CVE-2008-3276
CVE-2008-3526
CVE-2008-3534
CVE-2008-3535
CVE-2008-3792
CVE-2008-3915
DSA-1636
Platform(s):Debian GNU/Linux 4.0
Product(s):linux-2.6.24
Definition Synopsis
  • Debian GNU/Linux 4.0 is installed.
  • AND Architecture section
  • Architecture independent section
  • Installed architecture is all
  • AND Packages section
  • linux-patch-debian-2.6.24 is earlier than 2.6.24-6~etchnhalf.5
  • OR linux-support-2.6.24-etchnhalf.1 is earlier than 2.6.24-6~etchnhalf.5
  • OR linux-doc-2.6.24 is earlier than 2.6.24-6~etchnhalf.5
  • OR linux-tree-2.6.24 is earlier than 2.6.24-6~etchnhalf.5
  • OR linux-source-2.6.24 is earlier than 2.6.24-6~etchnhalf.5
  • OR linux-manual-2.6.24 is earlier than 2.6.24-6~etchnhalf.5
  • OR Architecture dependent section
  • Installed architecture is s390
  • AND Packages section
  • linux-image-2.6.24-etchnhalf.1-s390x is earlier than 2.6.24-6~etchnhalf.5
  • OR linux-headers-2.6.24-etchnhalf.1-s390 is earlier than 2.6.24-6~etchnhalf.5
  • OR linux-headers-2.6.24-etchnhalf.1-all-s390 is earlier than 2.6.24-6~etchnhalf.5
  • OR linux-image-2.6.24-etchnhalf.1-s390 is earlier than 2.6.24-6~etchnhalf.5
  • OR linux-image-2.6.24-etchnhalf.1-s390-tape is earlier than 2.6.24-6~etchnhalf.5
  • OR linux-headers-2.6.24-etchnhalf.1-all is earlier than 2.6.24-6~etchnhalf.5
  • OR linux-headers-2.6.24-etchnhalf.1-common is earlier than 2.6.24-6~etchnhalf.5
  • OR linux-headers-2.6.24-etchnhalf.1-s390x is earlier than 2.6.24-6~etchnhalf.5
  • OR Architecture dependent section
  • Supported architectures section
  • Installed architecture is amd64
  • OR Installed architecture is i386
  • AND Packages section
  • linux-headers-2.6.24-etchnhalf.1-amd64 is earlier than 2.6.24-6~etchnhalf.5
  • OR linux-headers-2.6.24-etchnhalf.1-common is earlier than 2.6.24-6~etchnhalf.5
  • OR linux-image-2.6.24-etchnhalf.1-amd64 is earlier than 2.6.24-6~etchnhalf.5
  • OR linux-headers-2.6.24-etchnhalf.1-all is earlier than 2.6.24-6~etchnhalf.5
  • OR Supported platform section
  • Installed architecture is hppa
  • AND Packages section
  • linux-image-2.6.24-etchnhalf.1-parisc64 is earlier than 2.6.24-6~etchnhalf.5
  • OR linux-image-2.6.24-etchnhalf.1-parisc-smp is earlier than 2.6.24-6~etchnhalf.5
  • OR linux-headers-2.6.24-etchnhalf.1-parisc-smp is earlier than 2.6.24-6~etchnhalf.5
  • OR linux-headers-2.6.24-etchnhalf.1-parisc64 is earlier than 2.6.24-6~etchnhalf.5
  • OR linux-image-2.6.24-etchnhalf.1-parisc is earlier than 2.6.24-6~etchnhalf.5
  • OR linux-headers-2.6.24-etchnhalf.1-all-hppa is earlier than 2.6.24-6~etchnhalf.5
  • OR linux-image-2.6.24-etchnhalf.1-parisc64-smp is earlier than 2.6.24-6~etchnhalf.5
  • OR linux-headers-2.6.24-etchnhalf.1-parisc64-smp is earlier than 2.6.24-6~etchnhalf.5
  • OR linux-headers-2.6.24-etchnhalf.1-all is earlier than 2.6.24-6~etchnhalf.5
  • OR linux-headers-2.6.24-etchnhalf.1-common is earlier than 2.6.24-6~etchnhalf.5
  • OR linux-headers-2.6.24-etchnhalf.1-parisc is earlier than 2.6.24-6~etchnhalf.5
  • BACK