Jump to content
Flubber

[USN-1071-1] Linux kernel vulnerabilities

Recommended Posts

Posted

Ubuntu Security Notice. Este vorba de Ubuntu 6.06 LTS, destul de vechi, dar daca foloseste cineva (motiv: sistem cu performanta scazuta?), se recomanda un update & upgrade.


A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
linux-image-2.6.15-55-386 2.6.15-55.93
linux-image-2.6.15-55-686 2.6.15-55.93
linux-image-2.6.15-55-amd64-generic 2.6.15-55.93
linux-image-2.6.15-55-amd64-k8 2.6.15-55.93
linux-image-2.6.15-55-amd64-server 2.6.15-55.93
linux-image-2.6.15-55-amd64-xeon 2.6.15-55.93
linux-image-2.6.15-55-hppa32 2.6.15-55.93
linux-image-2.6.15-55-hppa32-smp 2.6.15-55.93
linux-image-2.6.15-55-hppa64 2.6.15-55.93
linux-image-2.6.15-55-hppa64-smp 2.6.15-55.93
linux-image-2.6.15-55-itanium 2.6.15-55.93
linux-image-2.6.15-55-itanium-smp 2.6.15-55.93
linux-image-2.6.15-55-k7 2.6.15-55.93
linux-image-2.6.15-55-mckinley 2.6.15-55.93
linux-image-2.6.15-55-mckinley-smp 2.6.15-55.93
linux-image-2.6.15-55-powerpc 2.6.15-55.93
linux-image-2.6.15-55-powerpc-smp 2.6.15-55.93
linux-image-2.6.15-55-powerpc64-smp 2.6.15-55.93
linux-image-2.6.15-55-server 2.6.15-55.93
linux-image-2.6.15-55-server-bigiron 2.6.15-55.93
linux-image-2.6.15-55-sparc64 2.6.15-55.93
linux-image-2.6.15-55-sparc64-smp 2.6.15-55.93

After a standard system update you need to reboot your computer to make
all the necessary changes.

Details follow:

Tavis Ormandy discovered that the Linux kernel did not properly implement
exception fixup. A local attacker could exploit this to crash the kernel,
leading to a denial of service. (CVE-2010-3086)

Dan Rosenberg discovered that the Linux kernel TIPC implementation
contained multiple integer signedness errors. A local attacker could
exploit this to gain root privileges. (CVE-2010-3859)

Dan Rosenberg discovered that the Linux kernel X.25 implementation
incorrectly parsed facilities. A remote attacker could exploit this to
crash the kernel, leading to a denial of service. (CVE-2010-3873)

Vasiliy Kulikov discovered that the Linux kernel X.25 implementation did
not correctly clear kernel memory. A local attacker could exploit this to
read kernel stack memory, leading to a loss of privacy. (CVE-2010-3875)

Vasiliy Kulikov discovered that the Linux kernel sockets implementation
did not properly initialize certain structures. A local attacker could
exploit this to read kernel stack memory, leading to a loss of privacy.
(CVE-2010-3876)

Nelson Elhage discovered that the Linux kernel IPv4 implementation did not
properly audit certain bytecodes in netlink messages. A local attacker
could exploit this to cause the kernel to hang, leading to a denial of
service. (CVE-2010-3880)

Dan Rosenberg discovered that the SiS video driver did not correctly clear
kernel memory. A local attacker could exploit this to read kernel stack
memory, leading to a loss of privacy. (CVE-2010-4078)

Dan Rosenberg discovered that the RME Hammerfall DSP audio interface driver
did not correctly clear kernel memory. A local attacker could exploit this
to read kernel stack memory, leading to a loss of privacy. (CVE-2010-4080,
CVE-2010-4081)

Dan Rosenberg discovered that the semctl syscall did not correctly clear
kernel memory. A local attacker could exploit this to read kernel stack
memory, leading to a loss of privacy. (CVE-2010-4083)

James Bottomley discovered that the ICP vortex storage array controller
driver did not validate certain sizes. A local attacker on a 64bit system
could exploit this to crash the kernel, leading to a denial of service.
(CVE-2010-4157)

Dan Rosenberg discovered that the Linux kernel L2TP implementation
contained multiple integer signedness errors. A local attacker could
exploit this to to crash the kernel, or possibly gain root privileges.
(CVE-2010-4160)

Via RSS.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...