Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Debian Local Security Checks
Title:Debian Security Advisory DSA 1630-1 (linux-2.6)
The remote host is missing an update to linux-2.6
announced via advisory DSA 1630-1.

Several vulnerabilities have been discovered in the Linux kernel that may
lead to a denial of service or arbitrary code execution. The Common
Vulnerabilities and Exposures project identifies the following


Dirk Nehring discovered a vulnerability in the IPsec code that allows
remote users to cause a denial of service by sending a specially crafted
ESP packet.


Tavis Ormandy discovered a vulnerability that allows local users to access
uninitialized kernel memory, possibly leaking sensitive data. This issue
is specific to the amd64-flavour kernel images.


Andi Kleen discovered an issue where uninitialized kernel memory
was being leaked to userspace during an exception. This issue may allow
local users to gain access to sensitive data. Only the amd64-flavour
Debian kernel images are affected.


Alan Cox discovered an issue in multiple tty drivers that allows
local users to trigger a denial of service (NULL pointer dereference)
and possibly obtain elevated privileges.


Gabriel Campana discovered an integer overflow in the sctp code that
can be exploited by local users to cause a denial of service.


Miklos Szeredi reported a missing privilege check in the do_change_type()
function. This allows local, unprivileged users to change the properties
of mount points.


Tobias Klein reported a locally exploitable data leak in the
snd_seq_oss_synth_make_info() function. This may allow local users
to gain access to sensitive information.


Zoltan Sogor discovered a coding error in the VFS that allows local users
to exploit a kernel memory leak resulting in a denial of service.

For the stable distribution (etch), this problem has been fixed in
version 2.6.18.dfsg.1-22etch2.

We recommend that you upgrade your linux-2.6, fai-kernels, and


CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-6282
BugTraq ID: 29081
Debian Security Information: DSA-1630 (Google Search)
SuSE Security Announcement: SUSE-SA:2008:030 (Google Search)
SuSE Security Announcement: SUSE-SA:2008:031 (Google Search)
SuSE Security Announcement: SUSE-SA:2008:032 (Google Search)
XForce ISS Database: linux-kernel-esp-dos(42276)
Common Vulnerability Exposure (CVE) ID: CVE-2008-0598
BugTraq ID: 29942
RedHat Security Advisories: RHSA-2008:0508
SuSE Security Announcement: SUSE-SA:2008:047 (Google Search)
SuSE Security Announcement: SUSE-SA:2008:048 (Google Search)
SuSE Security Announcement: SUSE-SA:2008:049 (Google Search)
XForce ISS Database: linux-kernel-emulation-disclosure(43554)
Common Vulnerability Exposure (CVE) ID: CVE-2008-2729
BugTraq ID: 29943
XForce ISS Database: linux-kernel-destination-info-disclosure(43558)
Common Vulnerability Exposure (CVE) ID: CVE-2008-2812
BugTraq ID: 30076
SuSE Security Announcement: SUSE-SA:2008:035 (Google Search)
SuSE Security Announcement: SUSE-SA:2008:037 (Google Search)
SuSE Security Announcement: SUSE-SA:2008:038 (Google Search)
SuSE Security Announcement: SUSE-SA:2008:052 (Google Search)
SuSE Security Announcement: SUSE-SR:2008:025 (Google Search)
XForce ISS Database: kernel-tty-dos(43687)
Common Vulnerability Exposure (CVE) ID: CVE-2008-2826
BugTraq ID: 29990
XForce ISS Database: linux-kernel-sctpgetsockopt-dos(43559)
Common Vulnerability Exposure (CVE) ID: CVE-2008-2931
BugTraq ID: 30126
XForce ISS Database: linux-kernel-dochangetype-priv-escalation(43696)
Common Vulnerability Exposure (CVE) ID: CVE-2008-3272
BugTraq ID: 30559
Debian Security Information: DSA-1636 (Google Search)
RedHat Security Advisories: RHSA-2008:0972
XForce ISS Database: linux-kernel-seqosssynth-info-disclosure(44225)
Common Vulnerability Exposure (CVE) ID: CVE-2008-3275
BugTraq ID: 30647
XForce ISS Database: linux-kernel-ubifs-dos(44410)
CopyrightCopyright (c) 2008 E-Soft Inc.

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2022 E-Soft Inc. All rights reserved.