Ubuntu 1111-1: Linux kernel vulnerabilities

    Date05 May 2011
    CategoryUbuntu
    49
    Posted ByLinuxSecurity Advisories
    Multiple flaws fixed in the Linux kernel.
    ==========================================================================
    Ubuntu Security Notice USN-1111-1
    May 05, 2011
    
    linux-source-2.6.15 vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 6.06 LTS
    
    Summary:
    
    Multiple flaws fixed in the Linux kernel.
    
    Software Description:
    - linux-source-2.6.15: Linux kernel
    
    Details:
    
    Dan Rosenberg discovered multiple flaws in the X.25 facilities parsing. If
    a system was using X.25, a remote attacker could exploit this to crash the
    system, leading to a denial of service. (CVE-2010-4164)
    
    Vegard Nossum discovered that memory garbage collection was not handled
    correctly for active sockets. A local attacker could exploit this to
    allocate all available kernel memory, leading to a denial of service.
    (CVE-2010-4249)
    
    Nelson Elhage discovered that the kernel did not correctly handle process
    cleanup after triggering a recoverable kernel bug. If a local attacker were
    able to trigger certain kinds of kernel bugs, they could create a specially
    crafted process to gain root privileges. (CVE-2010-4258)
    
    Nelson Elhage discovered that Econet did not correctly handle AUN packets
    over UDP. A local attacker could send specially crafted traffic to crash
    the system, leading to a denial of service. (CVE-2010-4342)
    
    Dan Rosenberg discovered that the OSS subsystem did not handle name
    termination correctly. A local attacker could exploit this crash the system
    or gain root privileges. (CVE-2010-4527)
    
    Dan Rosenberg discovered that IRDA did not correctly check the size of
    buffers. On non-x86 systems, a local attacker could exploit this to read
    kernel heap memory, leading to a loss of privacy. (CVE-2010-4529)
    
    Dan Carpenter discovered that the TTPCI DVB driver did not check certain
    values during an ioctl. If the dvb-ttpci module was loaded, a local
    attacker could exploit this to crash the system, leading to a denial of
    service, or possibly gain root privileges. (CVE-2011-0521)
    
    Jens Kuehnel discovered that the InfiniBand driver contained a race
    condition. On systems using InfiniBand, a local attacker could send
    specially crafted requests to crash the system, leading to a denial of
    service. (CVE-2011-0695)
    
    Timo Warns discovered that the LDM disk partition handling code did not
    correctly handle certain values. By inserting a specially crafted disk
    device, a local attacker could exploit this to gain root privileges.
    (CVE-2011-1017)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 6.06 LTS:
      linux-image-2.6.15-57-386       2.6.15-57.97
      linux-image-2.6.15-57-686       2.6.15-57.97
      linux-image-2.6.15-57-amd64-generic  2.6.15-57.97
      linux-image-2.6.15-57-amd64-k8  2.6.15-57.97
      linux-image-2.6.15-57-amd64-server  2.6.15-57.97
      linux-image-2.6.15-57-amd64-xeon  2.6.15-57.97
      linux-image-2.6.15-57-hppa32    2.6.15-57.97
      linux-image-2.6.15-57-hppa32-smp  2.6.15-57.97
      linux-image-2.6.15-57-hppa64    2.6.15-57.97
      linux-image-2.6.15-57-hppa64-smp  2.6.15-57.97
      linux-image-2.6.15-57-itanium   2.6.15-57.97
      linux-image-2.6.15-57-itanium-smp  2.6.15-57.97
      linux-image-2.6.15-57-k7        2.6.15-57.97
      linux-image-2.6.15-57-mckinley  2.6.15-57.97
      linux-image-2.6.15-57-mckinley-smp  2.6.15-57.97
      linux-image-2.6.15-57-powerpc   2.6.15-57.97
      linux-image-2.6.15-57-powerpc-smp  2.6.15-57.97
      linux-image-2.6.15-57-powerpc64-smp  2.6.15-57.97
      linux-image-2.6.15-57-server    2.6.15-57.97
      linux-image-2.6.15-57-server-bigiron  2.6.15-57.97
      linux-image-2.6.15-57-sparc64   2.6.15-57.97
      linux-image-2.6.15-57-sparc64-smp  2.6.15-57.97
    
    After a standard system update you need to reboot your computer to make
    all the necessary changes.
    
    References:
      CVE-2010-4164, CVE-2010-4249, CVE-2010-4258, CVE-2010-4342,
      CVE-2010-4527, CVE-2010-4529, CVE-2011-0521, CVE-2011-0695,
      CVE-2011-1017
    
    Package Information:
      https://launchpad.net/ubuntu/+source/linux-source-2.6.15/2.6.15-57.97
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"23","type":"x","order":"1","pct":56.1,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":12.2,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"13","type":"x","order":"3","pct":31.71,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Advisories

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.