USN-807-1: Linux kernel vulnerabilities

Publication date

28 July 2009

Overview

Linux kernel vulnerabilities


Packages

Details

Michael Tokarev discovered that the RTL8169 network driver did not
correctly validate buffer sizes. A remote attacker on the local network
could send specially crafted traffic that would crash the system or
potentially grant elevated privileges. (CVE-2009-1389)

Julien Tinnes and Tavis Ormandy discovered that when executing setuid
processes the kernel did not clear certain personality flags. A local
attacker could exploit this to map the NULL memory page, causing other
vulnerabilities to become exploitable. Ubuntu 6.06 was not affected.
(CVE-2009-1895)

Matt T. Yourst discovered that KVM did not correctly validate the
page table root. A local attacker could exploit this to crash the
system, leading to a denial of service. Ubuntu 6.06 was not affected.
(CVE-2009-2287)

Ramon de Carvalho Valle discovered...

Michael Tokarev discovered that the RTL8169 network driver did not
correctly validate buffer sizes. A remote attacker on the local network
could send specially crafted traffic that would crash the system or
potentially grant elevated privileges. (CVE-2009-1389)

Julien Tinnes and Tavis Ormandy discovered that when executing setuid
processes the kernel did not clear certain personality flags. A local
attacker could exploit this to map the NULL memory page, causing other
vulnerabilities to become exploitable. Ubuntu 6.06 was not affected.
(CVE-2009-1895)

Matt T. Yourst discovered that KVM did not correctly validate the
page table root. A local attacker could exploit this to crash the
system, leading to a denial of service. Ubuntu 6.06 was not affected.
(CVE-2009-2287)

Ramon de Carvalho Valle discovered that eCryptfs did not correctly
validate certain buffer sizes. A local attacker could create specially
crafted eCryptfs files to crash the system or gain elevated privileges.
Ubuntu 6.06 was not affected. (CVE-2009-2406, CVE-2009-2407)


Update instructions

After a standard system upgrade you need to reboot your computer to effect the necessary changes.

Learn more about how to get the fixes.

ATTENTION: Due to an unavoidable ABI change for Ubuntu 9.04 the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. If you use linux-restricted-modules, you have to update that package as well to get modules which work with the new kernel version. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-server, linux-powerpc), a standard system upgrade will automatically perform this as well.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
9.04 jaunty linux-image-2.6.28-14-ixp4xx –  2.6.28-14.47
linux-image-2.6.28-14-server –  2.6.28-14.47
linux-image-2.6.28-14-imx51 –  2.6.28-14.47
linux-image-2.6.28-14-iop32x –  2.6.28-14.47
linux-image-2.6.28-14-lpia –  2.6.28-14.47
linux-image-2.6.28-14-generic –  2.6.28-14.47
linux-image-2.6.28-14-versatile –  2.6.28-14.47
linux-image-2.6.28-14-virtual –  2.6.28-14.47
8.10 intrepid linux-image-2.6.27-14-generic –  2.6.27-14.37
linux-image-2.6.27-14-server –  2.6.27-14.37
linux-image-2.6.27-14-virtual –  2.6.27-14.37
8.04 hardy linux-image-2.6.24-24-sparc64 –  2.6.24-24.57
linux-image-2.6.24-24-server –  2.6.24-24.57
linux-image-2.6.24-24-itanium –  2.6.24-24.57
linux-image-2.6.24-24-lpiacompat –  2.6.24-24.57
linux-image-2.6.24-24-hppa64 –  2.6.24-24.57
linux-image-2.6.24-24-virtual –  2.6.24-24.57
linux-image-2.6.24-24-powerpc64-smp –  2.6.24-24.57
linux-image-2.6.24-24-386 –  2.6.24-24.57
linux-image-2.6.24-24-generic –  2.6.24-24.57
linux-image-2.6.24-24-xen –  2.6.24-24.57
linux-image-2.6.24-24-powerpc-smp –  2.6.24-24.57
linux-image-2.6.24-24-rt –  2.6.24-24.57
linux-image-2.6.24-24-hppa32 –  2.6.24-24.57
linux-image-2.6.24-24-lpia –  2.6.24-24.57
linux-image-2.6.24-24-mckinley –  2.6.24-24.57
linux-image-2.6.24-24-sparc64-smp –  2.6.24-24.57
linux-image-2.6.24-24-powerpc –  2.6.24-24.57
linux-image-2.6.24-24-openvz –  2.6.24-24.57
6.06 dapper linux-image-2.6.15-54-hppa64 –  2.6.15-54.78
linux-image-2.6.15-54-hppa32-smp –  2.6.15-54.78
linux-image-2.6.15-54-server-bigiron –  2.6.15-54.78
linux-image-2.6.15-54-amd64-generic –  2.6.15-54.78
linux-image-2.6.15-54-itanium –  2.6.15-54.78
linux-image-2.6.15-54-k7 –  2.6.15-54.78
linux-image-2.6.15-54-powerpc-smp –  2.6.15-54.78
linux-image-2.6.15-54-server –  2.6.15-54.78
linux-image-2.6.15-54-amd64-server –  2.6.15-54.78
linux-image-2.6.15-54-sparc64-smp –  2.6.15-54.78
linux-image-2.6.15-54-sparc64 –  2.6.15-54.78
linux-image-2.6.15-54-mckinley-smp –  2.6.15-54.78
linux-image-2.6.15-54-amd64-k8 –  2.6.15-54.78
linux-image-2.6.15-54-386 –  2.6.15-54.78
linux-image-2.6.15-54-mckinley –  2.6.15-54.78
linux-image-2.6.15-54-hppa32 –  2.6.15-54.78
linux-image-2.6.15-54-amd64-xeon –  2.6.15-54.78
linux-image-2.6.15-54-powerpc –  2.6.15-54.78
linux-image-2.6.15-54-powerpc64-smp –  2.6.15-54.78
linux-image-2.6.15-54-itanium-smp –  2.6.15-54.78
linux-image-2.6.15-54-686 –  2.6.15-54.78
linux-image-2.6.15-54-hppa64-smp –  2.6.15-54.78

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›