logo
DATABASE RESOURCES PRICING ABOUT US

fai-kernels linux-2.6 user-mode-linux - several vulnerabilities

Description

Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation. The Common Vulnerabilities and Exposures project identifies the following problems: * [CVE-2008-3527](https://security-tracker.debian.org/tracker/CVE-2008-3527) Tavis Ormandy reported a local DoS and potential privilege escalation in the Virtual Dynamic Shared Objects (vDSO) implementation. * [CVE-2008-3528](https://security-tracker.debian.org/tracker/CVE-2008-3528) Eugene Teo reported a local DoS issue in the ext2 and ext3 filesystems. Local users who have been granted the privileges necessary to mount a filesystem would be able to craft a corrupted filesystem that causes the kernel to output error messages in an infinite loop. * [CVE-2008-4554](https://security-tracker.debian.org/tracker/CVE-2008-4554) Milos Szeredi reported that the usage of splice() on files opened with O\_APPEND allows users to write to the file at arbitrary offsets, enabling a bypass of possible assumed semantics of the O\_APPEND flag. * [CVE-2008-4576](https://security-tracker.debian.org/tracker/CVE-2008-4576) Vlad Yasevich reported an issue in the SCTP subsystem that may allow remote users to cause a local DoS by triggering a kernel oops. * [CVE-2008-4933](https://security-tracker.debian.org/tracker/CVE-2008-4933) Eric Sesterhenn reported a local DoS issue in the hfsplus filesystem. Local users who have been granted the privileges necessary to mount a filesystem would be able to craft a corrupted filesystem that causes the kernel to overrun a buffer, resulting in a system oops or memory corruption. * [CVE-2008-4934](https://security-tracker.debian.org/tracker/CVE-2008-4934) Eric Sesterhenn reported a local DoS issue in the hfsplus filesystem. Local users who have been granted the privileges necessary to mount a filesystem would be able to craft a corrupted filesystem that results in a kernel oops due to an unchecked return value. * [CVE-2008-5025](https://security-tracker.debian.org/tracker/CVE-2008-5025) Eric Sesterhenn reported a local DoS issue in the hfs filesystem. Local users who have been granted the privileges necessary to mount a filesystem would be able to craft a filesystem with a corrupted catalog name length, resulting in a system oops or memory corruption. * [CVE-2008-5029](https://security-tracker.debian.org/tracker/CVE-2008-5029) Andrea Bittau reported a DoS issue in the unix socket subsystem that allows a local user to cause memory corruption, resulting in a kernel panic. * [CVE-2008-5079](https://security-tracker.debian.org/tracker/CVE-2008-5079) Hugo Dias reported a DoS condition in the ATM subsystem that can be triggered by a local user by calling the svc\_listen function twice on the same socket and reading /proc/net/atm/\*vc. * [CVE-2008-5182](https://security-tracker.debian.org/tracker/CVE-2008-5182) Al Viro reported race conditions in the inotify subsystem that may allow local users to acquire elevated privileges. * [CVE-2008-5300](https://security-tracker.debian.org/tracker/CVE-2008-5300) Dann Frazier reported a DoS condition that allows local users to cause the out of memory handler to kill off privileged processes or trigger soft lockups due to a starvation issue in the unix socket subsystem. For the stable distribution (etch), this problem has been fixed in version 2.6.18.dfsg.1-23etch1. We recommend that you upgrade your linux-2.6, fai-kernels, and user-mode-linux packages. Note: Debian 'etch' includes linux kernel packages based upon both the 2.6.18 and 2.6.24 linux releases. All known security issues are carefully tracked against both packages and both packages will receive security updates until security support for Debian 'etch' concludes. However, given the high frequency at which low-severity security issues are discovered in the kernel and the resource requirements of doing an update, lower severity 2.6.18 and 2.6.24 updates will typically release in a staggered or "leap-frog" fashion.


Affected Software


CPE Name Name Version
user-mode-linux 2.6.18-1um-2etch.23
user-mode-linux 2.6.18-1um-2etch.22etch2
user-mode-linux 2.6.18-1um-2etch4
user-mode-linux 2.6.18-1um-2etch.13etch5
user-mode-linux 2.6.18-1um-2etch.18etch1
user-mode-linux 2.6.18-1um-2etch.18etch5
user-mode-linux 2.6.18-1um-2etch.13etch6
user-mode-linux 2.6.18-1um-2etch.18etch2
user-mode-linux 2.6.18-1um-2etch.13etch3
user-mode-linux 2.6.18-1um-2etch.18etch4
user-mode-linux 2.6.18-1um-2etch.17
user-mode-linux 2.6.18-1um-2etch2
user-mode-linux 2.6.18-1um-2
user-mode-linux 2.6.18-1um-2etch.22etch3
user-mode-linux 2.6.18-1um-2etch.13etch4
user-mode-linux 2.6.18-1um-2etch.17etch1
user-mode-linux 2.6.18-1um-2etch.16
user-mode-linux 2.6.18-1um-2etch.18etch3
user-mode-linux 2.6.18-1um-2etch1
user-mode-linux 2.6.18-1um-2etch3
user-mode-linux 2.6.18-1um-2etch.18etch6
user-mode-linux 2.6.18-1um-2etch.21
user-mode-linux 2.6.18-1um-2etch.22etch1

Related