USN-39-1: Linux amd64 kernel vulnerability
Publication date
17 December 2004
Overview
Linux amd64 kernel vulnerability
Releases
Details
USN-30-1 fixed several flaws in the Linux ELF binary loader’s handling
of setuid binaries. Unfortunately it was found that these patches were
not sufficient to prevent all possible attacks on 64-bit platforms, so
previous amd64 kernel images were still vulnerable to root privilege
escalation if setuid binaries were run under certain conditions.
This issue does not affect the i386 and powerpc platforms.
USN-30-1 fixed several flaws in the Linux ELF binary loader’s handling
of setuid binaries. Unfortunately it was found that these patches were
not sufficient to prevent all possible attacks on 64-bit platforms, so
previous amd64 kernel images were still vulnerable to root privilege
escalation if setuid binaries were run under certain conditions.
This issue does not affect the i386 and powerpc platforms.
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
4.10 warty | linux-image-2.6.8.1-4-amd64-k8 – | ||
linux-image-2.6.8.1-4-amd64-generic – | |||
linux-image-2.6.8.1-4-amd64-k8-smp – | |||
linux-image-2.6.8.1-4-amd64-xeon – |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.