USN-1023-1: Linux kernel vulnerabilities
30 November 2010
The Linux kernel could be made to run unauthorized programs with administrator privileges.
Releases
Packages
- linux - Linux kernel
- linux-ec2 - Linux kernel for EC2
- linux-source-2.6.15 - The Linux kernel
Details
Nelson Elhage discovered several problems with the Acorn Econet protocol
driver. A local user could cause a denial of service via a NULL pointer
dereference, escalate privileges by overflowing the kernel stack, and
assign Econet addresses to arbitrary interfaces. (CVE-2010-3848,
CVE-2010-3849, CVE-2010-3850)
Brad Spengler discovered that the wireless extensions did not correctly
validate certain request sizes. A local attacker could exploit this to read
portions of kernel memory, leading to a loss of privacy. (CVE-2010-2955)
Dan Rosenberg discovered that the VIA video driver did not correctly clear
kernel memory. A local attacker could exploit this to read kernel stack
memory, leading to a loss of privacy. (CVE-2010-4082)
A flaw was discovered in the Linux kernel's splice system call. A local
user could use this flaw to cause a denial of service (system crash).
(CVE-2013-2128)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 9.10
-
linux-image-2.6.31-22-server
-
2.6.31-22.69
-
linux-image-2.6.31-22-ia64
-
2.6.31-22.69
-
linux-image-2.6.31-307-ec2
-
2.6.31-307.22
-
linux-image-2.6.31-22-generic-pae
-
2.6.31-22.69
-
linux-image-2.6.31-22-386
-
2.6.31-22.69
-
linux-image-2.6.31-22-powerpc
-
2.6.31-22.69
-
linux-image-2.6.31-22-sparc64
-
2.6.31-22.69
-
linux-image-2.6.31-22-sparc64-smp
-
2.6.31-22.69
-
linux-image-2.6.31-22-powerpc-smp
-
2.6.31-22.69
-
linux-image-2.6.31-22-virtual
-
2.6.31-22.69
-
linux-image-2.6.31-22-powerpc64-smp
-
2.6.31-22.69
-
linux-image-2.6.31-22-generic
-
2.6.31-22.69
-
linux-image-2.6.31-22-lpia
-
2.6.31-22.69
Ubuntu 8.04
-
linux-image-2.6.24-28-powerpc64-smp
-
2.6.24-28.81
-
linux-image-2.6.24-28-hppa32
-
2.6.24-28.81
-
linux-image-2.6.24-28-generic
-
2.6.24-28.81
-
linux-image-2.6.24-28-powerpc
-
2.6.24-28.81
-
linux-image-2.6.24-28-sparc64-smp
-
2.6.24-28.81
-
linux-image-2.6.24-28-itanium
-
2.6.24-28.81
-
linux-image-2.6.24-28-openvz
-
2.6.24-28.81
-
linux-image-2.6.24-28-virtual
-
2.6.24-28.81
-
linux-image-2.6.24-28-rt
-
2.6.24-28.81
-
linux-image-2.6.24-28-lpia
-
2.6.24-28.81
-
linux-image-2.6.24-28-hppa64
-
2.6.24-28.81
-
linux-image-2.6.24-28-mckinley
-
2.6.24-28.81
-
linux-image-2.6.24-28-server
-
2.6.24-28.81
-
linux-image-2.6.24-28-powerpc-smp
-
2.6.24-28.81
-
linux-image-2.6.24-28-386
-
2.6.24-28.81
-
linux-image-2.6.24-28-lpiacompat
-
2.6.24-28.81
-
linux-image-2.6.24-28-sparc64
-
2.6.24-28.81
-
linux-image-2.6.24-28-xen
-
2.6.24-28.81
Ubuntu 6.06
-
linux-image-2.6.15-55-hppa64
-
2.6.15-55.90
-
linux-image-2.6.15-55-mckinley
-
2.6.15-55.90
-
linux-image-2.6.15-55-powerpc-smp
-
2.6.15-55.90
-
linux-image-2.6.15-55-hppa32-smp
-
2.6.15-55.90
-
linux-image-2.6.15-55-686
-
2.6.15-55.90
-
linux-image-2.6.15-55-amd64-k8
-
2.6.15-55.90
-
linux-image-2.6.15-55-amd64-server
-
2.6.15-55.90
-
linux-image-2.6.15-55-386
-
2.6.15-55.90
-
linux-image-2.6.15-55-sparc64-smp
-
2.6.15-55.90
-
linux-image-2.6.15-55-k7
-
2.6.15-55.90
-
linux-image-2.6.15-55-sparc64
-
2.6.15-55.90
-
linux-image-2.6.15-55-server
-
2.6.15-55.90
-
linux-image-2.6.15-55-powerpc64-smp
-
2.6.15-55.90
-
linux-image-2.6.15-55-hppa32
-
2.6.15-55.90
-
linux-image-2.6.15-55-mckinley-smp
-
2.6.15-55.90
-
linux-image-2.6.15-55-server-bigiron
-
2.6.15-55.90
-
linux-image-2.6.15-55-itanium-smp
-
2.6.15-55.90
-
linux-image-2.6.15-55-amd64-xeon
-
2.6.15-55.90
-
linux-image-2.6.15-55-powerpc
-
2.6.15-55.90
-
linux-image-2.6.15-55-amd64-generic
-
2.6.15-55.90
-
linux-image-2.6.15-55-hppa64-smp
-
2.6.15-55.90
-
linux-image-2.6.15-55-itanium
-
2.6.15-55.90
Ubuntu 10.10
-
linux-image-2.6.35-23-powerpc64-smp
-
2.6.35-23.41
-
linux-image-2.6.35-23-virtual
-
2.6.35-23.41
-
linux-image-2.6.35-23-versatile
-
2.6.35-23.41
-
linux-image-2.6.35-23-generic
-
2.6.35-23.41
-
linux-image-2.6.35-23-powerpc-smp
-
2.6.35-23.41
-
linux-image-2.6.35-23-powerpc
-
2.6.35-23.41
-
linux-image-2.6.35-23-omap
-
2.6.35-23.41
-
linux-image-2.6.35-23-generic-pae
-
2.6.35-23.41
-
linux-image-2.6.35-23-server
-
2.6.35-23.41
Ubuntu 10.04
-
linux-image-2.6.32-26-generic
-
2.6.32-26.48
-
linux-image-2.6.32-26-sparc64-smp
-
2.6.32-26.48
-
linux-image-2.6.32-26-preempt
-
2.6.32-26.48
-
linux-image-2.6.32-26-powerpc-smp
-
2.6.32-26.48
-
linux-image-2.6.32-26-versatile
-
2.6.32-26.48
-
linux-image-2.6.32-26-powerpc64-smp
-
2.6.32-26.48
-
linux-image-2.6.32-26-virtual
-
2.6.32-26.48
-
linux-image-2.6.32-26-generic-pae
-
2.6.32-26.48
-
linux-image-2.6.32-26-lpia
-
2.6.32-26.48
-
linux-image-2.6.32-26-powerpc
-
2.6.32-26.48
-
linux-image-2.6.32-310-ec2
-
2.6.32-310.21
-
linux-image-2.6.32-26-sparc64
-
2.6.32-26.48
-
linux-image-2.6.32-26-server
-
2.6.32-26.48
-
linux-image-2.6.32-26-ia64
-
2.6.32-26.48
-
linux-image-2.6.32-26-386
-
2.6.32-26.48
After a standard system update you need to reboot your computer to make
all the necessary changes.
Related notices
- USN-1074-1: linux-fsl-imx51, linux-image-2.6.31-112-imx51
- USN-1083-1: linux-image-2.6.35-25-virtual, linux-lts-backport-maverick, linux-image-2.6.35-25-server, linux-image-2.6.35-25-generic, linux-image-2.6.35-25-generic-pae
- USN-1119-1: linux-image-2.6.35-903-omap4, linux-ti-omap4
- USN-1074-2: linux-fsl-imx51, linux-image-2.6.31-608-imx51
- USN-1093-1: linux-image-2.6.32-416-dove, linux-mvl-dove, linux-image-2.6.32-216-dove
- USN-1073-1: linux-image-2.6.31-22-generic, linux-image-2.6.31-22-server, linux-image-2.6.31-22-virtual, linux-image-2.6.31-22-generic-pae, linux-image-2.6.31-22-lpia, linux-image-2.6.31-22-powerpc, linux-image-2.6.31-22-sparc64, linux-image-2.6.31-22-ia64, linux-ec2, linux-image-2.6.31-22-powerpc-smp, linux-image-2.6.31-22-sparc64-smp, linux-image-2.6.31-307-ec2, linux, linux-image-2.6.31-22-powerpc64-smp, linux-image-2.6.31-22-386
- USN-1164-1: linux-image-2.6.31-609-imx51, linux-fsl-imx51
- USN-1202-1: linux-image-2.6.35-903-omap4, linux-ti-omap4