[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

USN-1041-1 -- linux, linux-ec2 vulnerabilities

ID: oval:org.secpod.oval:def:700207Date: (C)2011-01-28   (M)2024-01-02
Class: PATCHFamily: unix




Dan Rosenberg discovered that the btrfs filesystem did not correctly validate permissions when using the clone function. A local attacker could overwrite the contents of file handles that were opened for append-only, or potentially read arbitrary contents, leading to a loss of privacy. Only Ubuntu 9.10 was affected. Dave Chinner discovered that the XFS filesystem did not correctly order inode lookups when exported by NFS. A remote attacker could exploit this to read or write disk blocks that had changed file assignement or had become unlinked, leading to a loss of privacy. Kees Cook discovered that the Intel i915 graphics driver did not correctly validate memory regions. A local attacker with access to the video card could read and write arbitrary kernel memory to gain root privileges. Ubuntu 10.10 was not affected. Robert Swiecki discovered that ftrace did not correctly handle mutexes. A local attacker could exploit this to crash the kernel, leading to a denial of service. Dan Rosenberg discovered that several network ioctls did not clear kernel memory correctly. A local user could exploit this to read kernel stack memory, leading to a loss of privacy. Ben Hawkes discovered that the Linux kernel did not correctly filter registers on 64bit kernels when performing 32bit system calls. On a 64bit system, a local attacker could manipulate 32bit system calls to gain root privileges. The Ubuntu EC2 kernels needed additional fixing. Brad Spengler discovered that stack memory for new a process was not correctly calculated. A local attacker could exploit this to crash the system, leading to a denial of service. Kees Cook discovered that the ethtool interface did not correctly clear kernel memory. A local attacker could read kernel heap memory, leading to a loss of privacy. Kees Cook and Vasiliy Kulikov discovered that the shm interface did not clear kernel memory correctly. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy

Platform:
Ubuntu 10.10
Ubuntu 9.10
Ubuntu 10.04
Product:
linux
Reference:
USN-1041-1
CVE-2014-0205
CVE-2010-4655
CVE-2010-4242
CVE-2010-4157
CVE-2010-4081
CVE-2010-4080
CVE-2010-4072
CVE-2010-3861
CVE-2010-3858
CVE-2010-3698
CVE-2010-3301
CVE-2010-3298
CVE-2010-3297
CVE-2010-3296
CVE-2010-3079
CVE-2010-2962
CVE-2010-2943
CVE-2010-2538
CVE-2010-2537
CVE    19
CVE-2010-2538
CVE-2010-2537
CVE-2010-4072
CVE-2010-4081
...
CPE    3
cpe:/o:ubuntu:ubuntu_linux:10.04
cpe:/o:ubuntu:ubuntu_linux:9.10
cpe:/o:ubuntu:ubuntu_linux:10.10

© SecPod Technologies