USN-509-1: Linux kernel vulnerabilities
Ubuntu Security Notice USN-509-1
30th August, 2007
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 6.10
A flaw in the sysfs_readdir function allowed a local user to cause a
denial of service by dereferencing a NULL pointer. (CVE-2007-3104)
A buffer overflow was discovered in the random number generator. In
environments with granular assignment of root privileges, a local attacker
could gain additional privileges. (CVE-2007-3105)
A flaw was discovered in the usblcd driver. A local attacker could cause
large amounts of kernel memory consumption, leading to a denial of service.
It was discovered that certain setuid-root processes did not correctly
reset process death signal handlers. A local user could manipulate this
to send signals to processes they would not normally have access to.
The Direct Rendering Manager for the i915 driver could be made to write
to arbitrary memory locations. An attacker with access to a running X11
session could send a specially crafted buffer and gain root privileges.
It was discovered that the aacraid SCSI driver did not correctly check
permissions on certain ioctls. A local attacker could cause a denial
of service or gain privileges. (CVE-2007-4308)
The problem can be corrected by updating your system to the following package version:
- Ubuntu 6.10:
- linux-image-2.6.17-12-mckinley 18.104.22.168-12.40
- linux-image-2.6.17-12-powerpc64-smp 22.214.171.124-12.40
- linux-image-2.6.17-12-server-bigiron 126.96.36.199-12.40
- linux-image-2.6.17-12-hppa64 188.8.131.52-12.40
- linux-image-2.6.17-12-sparc64-smp 184.108.40.206-12.40
- linux-image-2.6.17-12-generic 220.127.116.11-12.40
- linux-image-2.6.17-12-powerpc-smp 18.104.22.168-12.40
- linux-image-2.6.17-12-itanium 22.214.171.124-12.40
- linux-image-2.6.17-12-hppa32 126.96.36.199-12.40
- linux-image-2.6.17-12-386 188.8.131.52-12.40
- linux-image-2.6.17-12-powerpc 184.108.40.206-12.40
- linux-image-2.6.17-12-sparc64 220.127.116.11-12.40
- linux-image-2.6.17-12-server 18.104.22.168-12.40
To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.
After a standard system upgrade you need to reboot your computer to
effect the necessary changes.