Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

USN-281-1: Linux kernel vulnerabilities

4 May 2006

Linux kernel vulnerabilities

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.

Learn more about Ubuntu Pro

Releases

Details

The sys_mbind() function did not properly verify the validity of the
'maxnod' argument. A local user could exploit this to trigger a buffer
overflow, which caused a kernel crash. (CVE-2006-0557)

The SELinux module did not correctly handle the tracer SID when a
process was already being traced. A local attacker could exploit this
to cause a kernel crash. (CVE-2006-1052)

Al Viro discovered a local Denial of Service in the sysfs write buffer
handling. By writing a block with a length exactly equal to the
processor's page size to any writable file in /sys, a local attacker
could cause a kernel crash. (CVE-2006-1055)

John Blackwood discovered a race condition with single-step debugging
multiple processes at the same time. A local attacker could exploit
this to crash the system. This only affects the amd64 platform.
(CVE-2006-1066)

Marco Ivaldi discovered a flaw in the handling of the ID number of IP
packets. This number was incremented after receiving unsolicited TCP
SYN-ACK packets. A remote attacker could exploit this to conduct port
scans with the 'Idle scan' method (nmap -sI), which bypassed intended
port scan protections. (CVE-2006-1242)

Pavel Kankovsky discovered that the getsockopt() function, when called
with an SO_ORIGINAL_DST argument, does not properly clear the returned
structure, so that a random piece of kernel memory is exposed to the
user. This could potentially reveal sensitive data like passwords or
encryption keys. (CVE-2006-1343)

A buffer overflow was discovered in the USB Gadget RNDIS
implementation. While creating a reply message, the driver did not
allocate enough memory for the reply structure. A remote attacker
could exploit this to cause a kernel crash. (CVE-2006-1368)

Alexandra Kossovsky discovered an invalid memory access in the
ip_route_input() function. By using the 'ip' command in a particular
way to retrieve multicast routes, a local attacker could exploit this
to crash the kernel. (CVE-2006-1525)

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.

Learn more about Ubuntu Pro

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 5.10
  • linux-patch-ubuntu-2.6.10 -
  • linux-image-2.6.12-10-hppa64-smp -
  • linux-patch-ubuntu-2.6.12 -
  • linux-image-2.6.12-10-hppa32 -
  • linux-image-2.6.12-10-itanium-smp -
  • linux-image-2.6.10-6-686 -
  • linux-image-2.6.10-6-powerpc -
  • linux-image-2.6.10-6-itanium -
  • linux-image-2.6.10-6-power4-smp -
  • linux-image-2.6.12-10-powerpc64-smp -
  • linux-image-2.6.12-10-powerpc-smp -
  • linux-image-2.6.12-10-amd64-generic -
  • linux-image-2.6.12-10-iseries-smp -
  • linux-image-2.6.12-10-k7-smp -
  • linux-image-2.6.12-10-amd64-xeon -
  • linux-image-2.6.10-6-386 -
  • linux-image-2.6.12-10-itanium -
  • linux-image-2.6.12-10-hppa32-smp -
  • linux-image-2.6.12-10-powerpc -
  • linux-image-2.6.10-6-k7-smp -
  • linux-image-2.6.10-6-amd64-xeon -
  • linux-image-2.6.12-10-mckinley -
  • linux-image-2.6.10-6-itanium-smp -
  • linux-image-2.6.10-6-powerpc-smp -
  • linux-image-2.6.10-6-power3-smp -
  • linux-image-2.6.10-6-power3 -
  • linux-image-2.6.12-10-hppa64 -
  • linux-image-2.6.10-6-k7 -
  • linux-image-2.6.12-10-amd64-k8-smp -
  • linux-image-2.6.10-6-power4 -
  • linux-image-2.6.12-10-686 -
  • linux-image-2.6.10-6-mckinley -
  • linux-image-2.6.12-10-686-smp -
  • linux-image-2.6.10-6-686-smp -
  • linux-image-2.6.10-6-amd64-k8-smp -
  • linux-image-2.6.12-10-k7 -
  • linux-image-2.6.10-6-amd64-generic -
  • linux-image-2.6.10-6-amd64-k8 -
  • linux-image-2.6.12-10-mckinley-smp -
  • linux-image-2.6.12-10-386 -
  • linux-image-2.6.10-6-mckinley-smp -
  • linux-image-2.6.12-10-amd64-k8 -
Ubuntu 5.04
  • linux-patch-ubuntu-2.6.10 -
  • linux-image-2.6.12-10-hppa64-smp -
  • linux-patch-ubuntu-2.6.12 -
  • linux-image-2.6.12-10-hppa32 -
  • linux-image-2.6.12-10-itanium-smp -
  • linux-image-2.6.10-6-686 -
  • linux-image-2.6.10-6-powerpc -
  • linux-image-2.6.10-6-itanium -
  • linux-image-2.6.10-6-power4-smp -
  • linux-image-2.6.12-10-powerpc64-smp -
  • linux-image-2.6.12-10-powerpc-smp -
  • linux-image-2.6.12-10-amd64-generic -
  • linux-image-2.6.12-10-iseries-smp -
  • linux-image-2.6.12-10-k7-smp -
  • linux-image-2.6.12-10-amd64-xeon -
  • linux-image-2.6.10-6-386 -
  • linux-image-2.6.12-10-itanium -
  • linux-image-2.6.12-10-hppa32-smp -
  • linux-image-2.6.12-10-powerpc -
  • linux-image-2.6.10-6-k7-smp -
  • linux-image-2.6.10-6-amd64-xeon -
  • linux-image-2.6.12-10-mckinley -
  • linux-image-2.6.10-6-itanium-smp -
  • linux-image-2.6.10-6-powerpc-smp -
  • linux-image-2.6.10-6-power3-smp -
  • linux-image-2.6.10-6-power3 -
  • linux-image-2.6.12-10-hppa64 -
  • linux-image-2.6.10-6-k7 -
  • linux-image-2.6.12-10-amd64-k8-smp -
  • linux-image-2.6.10-6-power4 -
  • linux-image-2.6.12-10-686 -
  • linux-image-2.6.10-6-mckinley -
  • linux-image-2.6.12-10-686-smp -
  • linux-image-2.6.10-6-686-smp -
  • linux-image-2.6.10-6-amd64-k8-smp -
  • linux-image-2.6.12-10-k7 -
  • linux-image-2.6.10-6-amd64-generic -
  • linux-image-2.6.10-6-amd64-k8 -
  • linux-image-2.6.12-10-mckinley-smp -
  • linux-image-2.6.12-10-386 -
  • linux-image-2.6.10-6-mckinley-smp -
  • linux-image-2.6.12-10-amd64-k8 -

In general, a standard system update will make all the necessary changes.

Related notices

  • USN-302-1: linux-image-2.6.10-6-686, linux-image-2.6.12-10-k7-smp, linux-restricted-modules-2.6.15-25-386, linux-image-2.6.10-6-amd64-k8-smp, linux-restricted-modules-amd64-generic, linux-image-powerpc-smp, linux-image-power3-smp, linux-image-2.6.10-6-powerpc, linux-restricted-modules-powerpc, linux-restricted-modules-2.6.15-25-amd64-generic, linux-image-2.6.12-10-amd64-k8-smp, linux-image-2.6.15-25-386, linux-powerpc, linux-powerpc64-smp, linux-amd64-generic, linux-image-server, linux-image-power4-smp, linux-image-2.6.15-25-powerpc64-smp, linux-restricted-modules-2.6.15-25-powerpc, linux-restricted-modules-2.6.15-25-powerpc-smp, linux-image-2.6.10-6-686-smp, linux-image-2.6.10-6-powerpc-smp, linux-image-server-bigiron, linux-image-powerpc64-smp, linux-k7-smp, linux-image-2.6.10-6-k7, linux-image-2.6.12-10-amd64-generic, linux-image-2.6.12-10-386, linux-k7, linux-server-bigiron, fglrx-kernel-source, linux-image-power3, linux-amd64-k8-smp, linux-image-amd64-generic, xorg-driver-fglrx-dev, linux-power4-smp, linux-restricted-modules-2.6.15-25-amd64-xeon, linux-restricted-modules-amd64-xeon, linux-image-k7, linux-restricted-modules-2.6.15-25-k7, linux-image-2.6.12-10-686, linux-power4, linux-image-power4, nvidia-glx, linux-image-386, linux-686-smp, linux-power3-smp, linux-amd64-server, nvidia-glx-legacy, avm-fritz-kernel-source, avm-fritz-firmware-2.6.15-25, linux-686, linux-source-2.6.12, linux-image-2.6.15-25-amd64-xeon, linux-tree-2.6.10, linux-image-2.6.12-10-powerpc-smp, linux-image-686, linux-restricted-modules-amd64-k8, linux-image-2.6.12-10-amd64-k8, linux-image-2.6.15-25-k7, linux-tree-2.6.12, linux-image-2.6.12-10-686-smp, linux-image-2.6.12-10-amd64-xeon, linux-image-2.6.15-25-686, linux-image-2.6.10-6-amd64-k8, linux-powerpc-smp, linux-image-2.6.15-25-server-bigiron, linux-restricted-modules-k7, linux-image-2.6.12-10-powerpc, linux-image-2.6.12-10-k7, linux-image-2.6.10-6-386, linux-image-2.6.10-6-power3, linux-image-2.6.15-25-amd64-generic, linux-image-2.6.10-6-power4-smp, linux-image-amd64-xeon, linux-image-2.6.15-25-powerpc-smp, fglrx-control, linux-image-2.6.10-6-amd64-xeon, linux-source-2.6.10, linux-restricted-modules-common, linux-server, linux-source-2.6.15, linux-image-amd64-server, linux-patch-ubuntu-2.6.10, linux-image-2.6.10-6-power4, xorg-driver-fglrx, linux-image-2.6.10-6-power3-smp, linux-image-2.6.15-25-powerpc, linux-amd64-xeon, avm-fritz-firmware, linux-image-2.6.15-25-amd64-k8, linux-patch-ubuntu-2.6.12, nvidia-glx-legacy-dev, linux-restricted-modules-2.6.15-25-amd64-k8, linux-restricted-modules-powerpc-smp, linux-image-2.6.15-25-amd64-server, linux-image-2.6.10-6-k7-smp, linux-restricted-modules-2.6.15-25-686, nvidia-glx-dev, linux-image-powerpc, linux-image-2.6.10-6-amd64-generic, linux-power3, linux-image-2.6.15-25-server, linux-image-amd64-k8, linux-image-2.6.12-10-powerpc64-smp, linux-amd64-k8, linux-restricted-modules-686, linux-restricted-modules-386, linux-386