fai-kernels linux-2.6 user-mode-linux - several vulnerabilities


Several vulnerabilities have been discovered in the Linux kernel that may lead to denial of service, privilege escalation or a leak of sensitive memory. The Common Vulnerabilities and Exposures project identifies the following problems: * [CVE-2009-2698](https://security-tracker.debian.org/tracker/CVE-2009-2698) Herbert Xu discovered an issue in the way UDP tracks corking status that could allow local users to cause a denial of service (system crash). Tavis Ormandy and Julien Tinnes discovered that this issue could also be used by local users to gain elevated privileges. * [CVE-2009-2846](https://security-tracker.debian.org/tracker/CVE-2009-2846) Michael Buesch noticed a typing issue in the eisa-eeprom driver for the hppa architecture. Local users could exploit this issue to gain access to restricted memory. * [CVE-2009-2847](https://security-tracker.debian.org/tracker/CVE-2009-2847) Ulrich Drepper noticed an issue in the do\_sigalstack routine on 64-bit systems. This issue allows local users to gain access to potentially sensitive memory on the kernel stack. * [CVE-2009-2848](https://security-tracker.debian.org/tracker/CVE-2009-2848) Eric Dumazet discovered an issue in the execve path, where the clear\_child\_tid variable was not being properly cleared. Local users could exploit this issue to cause a denial of service (memory corruption). * [CVE-2009-2849](https://security-tracker.debian.org/tracker/CVE-2009-2849) Neil Brown discovered an issue in the sysfs interface to md devices. When md arrays are not active, local users can exploit this vulnerability to cause a denial of service (oops). For the oldstable distribution (etch), this problem has been fixed in version 2.6.18.dfsg.1-24etch4. We recommend that you upgrade your linux-2.6, fai-kernels, and user-mode-linux packages. Note: Debian carefully tracks all known security issues across every linux kernel package in all releases under active security support. However, given the high frequency at which low-severity security issues are discovered in the kernel and the resource requirements of doing an update, updates for lower priority issues will normally not be released for all kernels at the same time. Rather, they will be released in a staggered or "leap-frog" fashion. The following matrix lists additional source packages that were rebuilt for compatibility with or to take advantage of this update: | | Debian 4.0 (etch) | | --- | --- | | fai-kernels | 1.17+etch.24etch4 | | user-mode-linux | 2.6.18-1um-2etch.24etch4 |

Affected Software

CPE Name Name Version
user-mode-linux 2.6.18-1um-2
user-mode-linux 2.6.18-1um-2etch.13etch3
user-mode-linux 2.6.18-1um-2etch.13etch4
user-mode-linux 2.6.18-1um-2etch.13etch5
user-mode-linux 2.6.18-1um-2etch.13etch6
user-mode-linux 2.6.18-1um-2etch.16
user-mode-linux 2.6.18-1um-2etch.17
user-mode-linux 2.6.18-1um-2etch.17etch1
user-mode-linux 2.6.18-1um-2etch.18etch1
user-mode-linux 2.6.18-1um-2etch.18etch2
user-mode-linux 2.6.18-1um-2etch.18etch3
user-mode-linux 2.6.18-1um-2etch.18etch4
user-mode-linux 2.6.18-1um-2etch.18etch5
user-mode-linux 2.6.18-1um-2etch.18etch6
user-mode-linux 2.6.18-1um-2etch.21
user-mode-linux 2.6.18-1um-2etch.22etch1
user-mode-linux 2.6.18-1um-2etch.22etch2
user-mode-linux 2.6.18-1um-2etch.22etch3
user-mode-linux 2.6.18-1um-2etch.23
user-mode-linux 2.6.18-1um-2etch.23etch1
user-mode-linux 2.6.18-1um-2etch.24
user-mode-linux 2.6.18-1um-2etch.24etch2
user-mode-linux 2.6.18-1um-2etch.24etch3
user-mode-linux 2.6.18-1um-2etch1
user-mode-linux 2.6.18-1um-2etch2
user-mode-linux 2.6.18-1um-2etch3
user-mode-linux 2.6.18-1um-2etch4