USN-807-1: Linux kernel vulnerabilities

Ubuntu Security Notice USN-807-1

28th July, 2009

linux, linux-source-2.6.15 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 9.04
  • Ubuntu 8.10
  • Ubuntu 8.04 LTS
  • Ubuntu 6.06 LTS

Software description

  • linux
  • linux-source-2.6.15


Michael Tokarev discovered that the RTL8169 network driver did not
correctly validate buffer sizes. A remote attacker on the local network
could send specially crafted traffic that would crash the system or
potentially grant elevated privileges. (CVE-2009-1389)

Julien Tinnes and Tavis Ormandy discovered that when executing setuid
processes the kernel did not clear certain personality flags. A local
attacker could exploit this to map the NULL memory page, causing other
vulnerabilities to become exploitable. Ubuntu 6.06 was not affected.

Matt T. Yourst discovered that KVM did not correctly validate the
page table root. A local attacker could exploit this to crash the
system, leading to a denial of service. Ubuntu 6.06 was not affected.

Ramon de Carvalho Valle discovered that eCryptfs did not correctly
validate certain buffer sizes. A local attacker could create specially
crafted eCryptfs files to crash the system or gain elevated privileges.
Ubuntu 6.06 was not affected. (CVE-2009-2406, CVE-2009-2407)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 9.04:
linux-image-2.6.28-14-ixp4xx 2.6.28-14.47
linux-image-2.6.28-14-server 2.6.28-14.47
linux-image-2.6.28-14-imx51 2.6.28-14.47
linux-image-2.6.28-14-iop32x 2.6.28-14.47
linux-image-2.6.28-14-lpia 2.6.28-14.47
linux-image-2.6.28-14-generic 2.6.28-14.47
linux-image-2.6.28-14-versatile 2.6.28-14.47
linux-image-2.6.28-14-virtual 2.6.28-14.47
Ubuntu 8.10:
linux-image-2.6.27-14-generic 2.6.27-14.37
linux-image-2.6.27-14-server 2.6.27-14.37
linux-image-2.6.27-14-virtual 2.6.27-14.37
Ubuntu 8.04 LTS:
linux-image-2.6.24-24-sparc64 2.6.24-24.57
linux-image-2.6.24-24-server 2.6.24-24.57
linux-image-2.6.24-24-itanium 2.6.24-24.57
linux-image-2.6.24-24-lpiacompat 2.6.24-24.57
linux-image-2.6.24-24-hppa64 2.6.24-24.57
linux-image-2.6.24-24-virtual 2.6.24-24.57
linux-image-2.6.24-24-powerpc64-smp 2.6.24-24.57
linux-image-2.6.24-24-386 2.6.24-24.57
linux-image-2.6.24-24-generic 2.6.24-24.57
linux-image-2.6.24-24-xen 2.6.24-24.57
linux-image-2.6.24-24-powerpc-smp 2.6.24-24.57
linux-image-2.6.24-24-rt 2.6.24-24.57
linux-image-2.6.24-24-hppa32 2.6.24-24.57
linux-image-2.6.24-24-lpia 2.6.24-24.57
linux-image-2.6.24-24-mckinley 2.6.24-24.57
linux-image-2.6.24-24-sparc64-smp 2.6.24-24.57
linux-image-2.6.24-24-powerpc 2.6.24-24.57
linux-image-2.6.24-24-openvz 2.6.24-24.57
Ubuntu 6.06 LTS:
linux-image-2.6.15-54-hppa64 2.6.15-54.78
linux-image-2.6.15-54-hppa32-smp 2.6.15-54.78
linux-image-2.6.15-54-server-bigiron 2.6.15-54.78
linux-image-2.6.15-54-amd64-generic 2.6.15-54.78
linux-image-2.6.15-54-itanium 2.6.15-54.78
linux-image-2.6.15-54-k7 2.6.15-54.78
linux-image-2.6.15-54-powerpc-smp 2.6.15-54.78
linux-image-2.6.15-54-server 2.6.15-54.78
linux-image-2.6.15-54-amd64-server 2.6.15-54.78
linux-image-2.6.15-54-sparc64-smp 2.6.15-54.78
linux-image-2.6.15-54-sparc64 2.6.15-54.78
linux-image-2.6.15-54-mckinley-smp 2.6.15-54.78
linux-image-2.6.15-54-amd64-k8 2.6.15-54.78
linux-image-2.6.15-54-386 2.6.15-54.78
linux-image-2.6.15-54-mckinley 2.6.15-54.78
linux-image-2.6.15-54-hppa32 2.6.15-54.78
linux-image-2.6.15-54-amd64-xeon 2.6.15-54.78
linux-image-2.6.15-54-powerpc 2.6.15-54.78
linux-image-2.6.15-54-powerpc64-smp 2.6.15-54.78
linux-image-2.6.15-54-itanium-smp 2.6.15-54.78
linux-image-2.6.15-54-686 2.6.15-54.78
linux-image-2.6.15-54-hppa64-smp 2.6.15-54.78

To update your system, please follow these instructions:

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

ATTENTION: Due to an unavoidable ABI change for Ubuntu 9.04 the kernel
updates have been given a new version number, which requires you to
recompile and reinstall all third party kernel modules you might have
installed. If you use linux-restricted-modules, you have to update
that package as well to get modules which work with the new kernel
version. Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-server, linux-powerpc), a standard system
upgrade will automatically perform this as well.


CVE-2009-1389, CVE-2009-1895, CVE-2009-2287, CVE-2009-2406, CVE-2009-2407