USN-1023-1: Linux kernel vulnerabilities

Ubuntu Security Notice USN-1023-1

29th November, 2010

linux, linux-{ec2,source-2.6.15} vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 10.10
  • Ubuntu 10.04 LTS
  • Ubuntu 9.10
  • Ubuntu 8.04 LTS
  • Ubuntu 6.06 LTS

Summary

The Linux kernel could be made to run unauthorized programs with administrator privileges.

Software description

  • linux - Linux kernel
  • linux-ec2 - Linux kernel for EC2
  • linux-source-2.6.15 - The Linux kernel

Details


Nelson Elhage discovered several problems with the Acorn Econet protocol
driver. A local user could cause a denial of service via a NULL pointer
dereference, escalate privileges by overflowing the kernel stack, and
assign Econet addresses to arbitrary interfaces. (CVE-2010-3848,
CVE-2010-3849, CVE-2010-3850)

Brad Spengler discovered that the wireless extensions did not correctly
validate certain request sizes. A local attacker could exploit this to read
portions of kernel memory, leading to a loss of privacy. (CVE-2010-2955)

Dan Rosenberg discovered that the VIA video driver did not correctly clear
kernel memory. A local attacker could exploit this to read kernel stack
memory, leading to a loss of privacy. (CVE-2010-4082)

A flaw was discovered in the Linux kernel's splice system call. A local
user could use this flaw to cause a denial of service (system crash).
(CVE-2013-2128)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 10.10:
linux-image-2.6.35-23-powerpc64-smp 2.6.35-23.41
linux-image-2.6.35-23-virtual 2.6.35-23.41
linux-image-2.6.35-23-versatile 2.6.35-23.41
linux-image-2.6.35-23-generic 2.6.35-23.41
linux-image-2.6.35-23-powerpc-smp 2.6.35-23.41
linux-image-2.6.35-23-powerpc 2.6.35-23.41
linux-image-2.6.35-23-omap 2.6.35-23.41
linux-image-2.6.35-23-generic-pae 2.6.35-23.41
linux-image-2.6.35-23-server 2.6.35-23.41
Ubuntu 10.04 LTS:
linux-image-2.6.32-26-generic 2.6.32-26.48
linux-image-2.6.32-26-sparc64-smp 2.6.32-26.48
linux-image-2.6.32-26-preempt 2.6.32-26.48
linux-image-2.6.32-26-powerpc-smp 2.6.32-26.48
linux-image-2.6.32-26-versatile 2.6.32-26.48
linux-image-2.6.32-26-powerpc64-smp 2.6.32-26.48
linux-image-2.6.32-26-virtual 2.6.32-26.48
linux-image-2.6.32-26-generic-pae 2.6.32-26.48
linux-image-2.6.32-26-lpia 2.6.32-26.48
linux-image-2.6.32-26-powerpc 2.6.32-26.48
linux-image-2.6.32-310-ec2 2.6.32-310.21
linux-image-2.6.32-26-sparc64 2.6.32-26.48
linux-image-2.6.32-26-server 2.6.32-26.48
linux-image-2.6.32-26-ia64 2.6.32-26.48
linux-image-2.6.32-26-386 2.6.32-26.48
Ubuntu 9.10:
linux-image-2.6.31-22-server 2.6.31-22.69
linux-image-2.6.31-22-ia64 2.6.31-22.69
linux-image-2.6.31-307-ec2 2.6.31-307.22
linux-image-2.6.31-22-generic-pae 2.6.31-22.69
linux-image-2.6.31-22-386 2.6.31-22.69
linux-image-2.6.31-22-powerpc 2.6.31-22.69
linux-image-2.6.31-22-sparc64 2.6.31-22.69
linux-image-2.6.31-22-sparc64-smp 2.6.31-22.69
linux-image-2.6.31-22-powerpc-smp 2.6.31-22.69
linux-image-2.6.31-22-virtual 2.6.31-22.69
linux-image-2.6.31-22-powerpc64-smp 2.6.31-22.69
linux-image-2.6.31-22-generic 2.6.31-22.69
linux-image-2.6.31-22-lpia 2.6.31-22.69
Ubuntu 8.04 LTS:
linux-image-2.6.24-28-powerpc64-smp 2.6.24-28.81
linux-image-2.6.24-28-hppa32 2.6.24-28.81
linux-image-2.6.24-28-generic 2.6.24-28.81
linux-image-2.6.24-28-powerpc 2.6.24-28.81
linux-image-2.6.24-28-sparc64-smp 2.6.24-28.81
linux-image-2.6.24-28-itanium 2.6.24-28.81
linux-image-2.6.24-28-openvz 2.6.24-28.81
linux-image-2.6.24-28-virtual 2.6.24-28.81
linux-image-2.6.24-28-rt 2.6.24-28.81
linux-image-2.6.24-28-lpia 2.6.24-28.81
linux-image-2.6.24-28-hppa64 2.6.24-28.81
linux-image-2.6.24-28-mckinley 2.6.24-28.81
linux-image-2.6.24-28-server 2.6.24-28.81
linux-image-2.6.24-28-powerpc-smp 2.6.24-28.81
linux-image-2.6.24-28-386 2.6.24-28.81
linux-image-2.6.24-28-lpiacompat 2.6.24-28.81
linux-image-2.6.24-28-sparc64 2.6.24-28.81
linux-image-2.6.24-28-xen 2.6.24-28.81
Ubuntu 6.06 LTS:
linux-image-2.6.15-55-hppa64 2.6.15-55.90
linux-image-2.6.15-55-mckinley 2.6.15-55.90
linux-image-2.6.15-55-powerpc-smp 2.6.15-55.90
linux-image-2.6.15-55-hppa32-smp 2.6.15-55.90
linux-image-2.6.15-55-686 2.6.15-55.90
linux-image-2.6.15-55-amd64-k8 2.6.15-55.90
linux-image-2.6.15-55-amd64-server 2.6.15-55.90
linux-image-2.6.15-55-386 2.6.15-55.90
linux-image-2.6.15-55-sparc64-smp 2.6.15-55.90
linux-image-2.6.15-55-k7 2.6.15-55.90
linux-image-2.6.15-55-sparc64 2.6.15-55.90
linux-image-2.6.15-55-server 2.6.15-55.90
linux-image-2.6.15-55-powerpc64-smp 2.6.15-55.90
linux-image-2.6.15-55-hppa32 2.6.15-55.90
linux-image-2.6.15-55-mckinley-smp 2.6.15-55.90
linux-image-2.6.15-55-server-bigiron 2.6.15-55.90
linux-image-2.6.15-55-itanium-smp 2.6.15-55.90
linux-image-2.6.15-55-amd64-xeon 2.6.15-55.90
linux-image-2.6.15-55-powerpc 2.6.15-55.90
linux-image-2.6.15-55-amd64-generic 2.6.15-55.90
linux-image-2.6.15-55-hppa64-smp 2.6.15-55.90
linux-image-2.6.15-55-itanium 2.6.15-55.90

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

CVE-2010-2955, CVE-2010-3848, CVE-2010-3849, CVE-2010-3850, CVE-2010-4082, CVE-2013-2128