Lucene search

K
osvGoogleOSV:DSA-1630-1
HistoryAug 21, 2008 - 12:00 a.m.

fai-kernels linux-2.6 user-mode-linux - several vulnerabilities

2008-08-2100:00:00
Google
osv.dev
23

0.003 Low

EPSS

Percentile

70.1%

Several vulnerabilities have been discovered in the Linux kernel that may
lead to a denial of service or arbitrary code execution. The Common
Vulnerabilities and Exposures project identifies the following
problems:

  • CVE-2007-6282
    Dirk Nehring discovered a vulnerability in the IPsec code that allows
    remote users to cause a denial of service by sending a specially crafted
    ESP packet.
  • CVE-2008-0598
    Tavis Ormandy discovered a vulnerability that allows local users to access
    uninitialized kernel memory, possibly leaking sensitive data. This issue
    is specific to the amd64-flavour kernel images.
  • CVE-2008-2729
    Andi Kleen discovered an issue where uninitialized kernel memory
    was being leaked to userspace during an exception. This issue may allow
    local users to gain access to sensitive data. Only the amd64-flavour
    Debian kernel images are affected.
  • CVE-2008-2812
    Alan Cox discovered an issue in multiple tty drivers that allows
    local users to trigger a denial of service (NULL pointer dereference)
    and possibly obtain elevated privileges.
  • CVE-2008-2826
    Gabriel Campana discovered an integer overflow in the sctp code that
    can be exploited by local users to cause a denial of service.
  • CVE-2008-2931
    Miklos Szeredi reported a missing privilege check in the do_change_type()
    function. This allows local, unprivileged users to change the properties
    of mount points.
  • CVE-2008-3272
    Tobias Klein reported a locally exploitable data leak in the
    snd_seq_oss_synth_make_info() function. This may allow local users
    to gain access to sensitive information.
  • CVE-2008-3275
    Zoltan Sogor discovered a coding error in the VFS that allows local users
    to exploit a kernel memory leak resulting in a denial of service.

For the stable distribution (etch), this problem has been fixed in
version 2.6.18.dfsg.1-22etch2.

We recommend that you upgrade your linux-2.6, fai-kernels, and
user-mode-linux packages.