USN-807-1: Linux kernel vulnerabilities

view full story

http://www.ubuntu.com – Referenced CVEs:  CVE-2009-1389, CVE-2009-1895, CVE-2009-2287, CVE-2009-2406, CVE-2009-2407 Description:  =========================================================== Ubuntu Security Notice USN-807-1 July 28, 2009 linux, linux-source-2.6.15 vulnerabilities CVE-2009-1389, CVE-2009-1895, CVE-2009-2287, CVE-2009-2406, CVE-2009-2407 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS Ubuntu 8.04 LTS Ubuntu 8.10 Ubuntu 9.04 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: linux-image-2.6.15-54-386 2.6.15-54.78 linux-image-2.6.15-54-686 2.6.15-54.78 linux-image-2.6.15-54-amd64-generic 2.6.15-54.78 linux-image-2.6.15-54-amd64-k8 2.6.15-54.78 linux-image-2.6.15-54-amd64-server 2.6.15-54.78 linux-image-2.6.15-54-amd64-xeon 2.6.15-54.78 linux-image-2.6.15-54-hppa32 2.6.15-54.78 linux-image-2.6.15-54-hppa32-smp 2.6.15-54.78 linux-image-2.6.15-54-hppa64 2.6.15-54.78 linux-image-2.6.15-54-hppa64-smp 2.6.15-54.78 linux-image-2.6.15-54-itanium 2.6.15-54.78 linux-image-2.6.15-54-itanium-smp 2.6.15-54.78 linux-image-2.6.15-54-k7 2.6.15-54.78 linux-image-2.6.15-54-mckinley 2.6.15-54.78 linux-image-2.6.15-54-mckinley-smp 2.6.15-54.78 linux-image-2.6.15-54-powerpc 2.6.15-54.78 linux-image-2.6.15-54-powerpc-smp 2.6.15-54.78 linux-image-2.6.15-54-powerpc64-smp 2.6.15-54.78 linux-image-2.6.15-54-server 2.6.15-54.78 linux-image-2.6.15-54-server-bigiron 2.6.15-54.78 linux-image-2.6.15-54-sparc64 2.6.15-54.78 linux-image-2.6.15-54-sparc64-smp 2.6.15-54.78 Ubuntu 8.04 LTS: linux-image-2.6.24-24-386 2.6.24-24.57 linux-image-2.6.24-24-generic 2.6.24-24.57 linux-image-2.6.24-24-hppa32 2.6.24-24.57 linux-image-2.6.24-24-hppa64 2.6.24-24.57 linux-image-2.6.24-24-itanium 2.6.24-24.57 linux-image-2.6.24-24-lpia 2.6.24-24.57 linux-image-2.6.24-24-lpiacompat 2.6.24-24.57 linux-image-2.6.24-24-mckinley 2.6.24-24.57 linux-image-2.6.24-24-openvz 2.6.24-24.57 linux-image-2.6.24-24-powerpc 2.6.24-24.57 linux-image-2.6.24-24-powerpc-smp 2.6.24-24.57 linux-image-2.6.24-24-powerpc64-smp 2.6.24-24.57 linux-image-2.6.24-24-rt 2.6.24-24.57 linux-image-2.6.24-24-server 2.6.24-24.57 linux-image-2.6.24-24-sparc64 2.6.24-24.57 linux-image-2.6.24-24-sparc64-smp 2.6.24-24.57 linux-image-2.6.24-24-virtual 2.6.24-24.57 linux-image-2.6.24-24-xen 2.6.24-24.57 Ubuntu 8.10: linux-image-2.6.27-14-generic 2.6.27-14.37 linux-image-2.6.27-14-server 2.6.27-14.37 linux-image-2.6.27-14-virtual 2.6.27-14.37 Ubuntu 9.04: linux-image-2.6.28-14-generic 2.6.28-14.47 linux-image-2.6.28-14-imx51 2.6.28-14.47 linux-image-2.6.28-14-iop32x 2.6.28-14.47 linux-image-2.6.28-14-ixp4xx 2.6.28-14.47 linux-image-2.6.28-14-lpia 2.6.28-14.47 linux-image-2.6.28-14-server 2.6.28-14.47 linux-image-2.6.28-14-versatile 2.6.28-14.47 linux-image-2.6.28-14-virtual 2.6.28-14.47 After a standard system upgrade you need to reboot your computer to effect the necessary changes. ATTENTION: Due to an unavoidable ABI change for Ubuntu 9.04 the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. If you use linux-restricted-modules, you have to update that package as well to get modules which work with the new kernel version. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-server, linux-powerpc), a standard system upgrade will automatically perform this as well. Details follow: Michael Tokarev discovered that the RTL8169 network driver did not correctly validate buffer sizes. A remote attacker on the local network could send specially traffic traffic that would crash the system or potentially grant elevated privileges. (CVE-2009-1389) Julien Tinnes and Tavis Ormandy discovered that when executing setuid processes the kernel did not clear certain personality flags. A local attacker could exploit this to map the NULL memory page, causing other vulnerabilities to become exploitable. Ubuntu 6.06 was not affected. (CVE-2009-1895) Matt T. Yourst discovered that KVM did not correctly validate the page table root. A local attacker could exploit this to crash the system, leading to a denial of service. Ubuntu 6.06 was not affected. (CVE-2009-2287) Ramon de Carvalho Valle discovered that eCryptfs did not correctly validate certain buffer sizes. A local attacker could create specially crafted eCryptfs files to crash the system or gain elevated privileges. Ubuntu 6.06 was not affected. (CVE-2009-2406, CVE-2009-2407) (Distributions)