Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

USN-1146-1: Linux kernel vulnerabilities

9 June 2011

Multiple flaws fixed in the Linux kernel.

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.

Learn more about Ubuntu Pro

Releases

Packages

Details

Kees Cook discovered that some ethtool functions did not correctly clear
heap memory. A local attacker with CAP_NET_ADMIN privileges could exploit
this to read portions of kernel heap memory, leading to a loss of privacy.
(CVE-2010-4655)

Kees Cook discovered that the IOWarrior USB device driver did not correctly
check certain size fields. A local attacker with physical access could plug
in a specially crafted USB device to crash the system or potentially gain
root privileges. (CVE-2010-4656)

Goldwyn Rodrigues discovered that the OCFS2 filesystem did not correctly
clear memory when writing certain file holes. A local attacker could
exploit this to read uninitialized data from the disk, leading to a loss of
privacy. (CVE-2011-0463)

Jens Kuehnel discovered that the InfiniBand driver contained a race
condition. On systems using InfiniBand, a local attacker could send
specially crafted requests to crash the system, leading to a denial of
service. (CVE-2011-0695)

Rafael Dominguez Vega discovered that the caiaq Native Instruments USB
driver did not correctly validate string lengths. A local attacker with
physical access could plug in a specially crafted USB device to crash the
system or potentially gain root privileges. (CVE-2011-0712)

Timo Warns discovered that LDM partition parsing routines did not correctly
calculate block counts. A local attacker with physical access could plug in
a specially crafted block device to crash the system, leading to a denial
of service. (CVE-2011-1012)

Timo Warns discovered that the LDM disk partition handling code did not
correctly handle certain values. By inserting a specially crafted disk
device, a local attacker could exploit this to gain root privileges.
(CVE-2011-1017)

Tavis Ormandy discovered that the pidmap function did not correctly handle
large requests. A local attacker could exploit this to crash the system,
leading to a denial of service. (CVE-2011-1593)

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.

Learn more about Ubuntu Pro

Related notices

  • USN-1164-1: linux-image-2.6.31-609-imx51, linux-fsl-imx51
  • USN-1202-1: linux-ti-omap4, linux-image-2.6.35-903-omap4
  • USN-1083-1: linux-image-2.6.35-25-virtual, linux-lts-backport-maverick, linux-image-2.6.35-25-server, linux-image-2.6.35-25-generic-pae, linux-image-2.6.35-25-generic
  • USN-1041-1: linux-image-2.6.32-27-lpia, linux-image-2.6.31-22-lpia, linux-image-2.6.31-22-sparc64, linux-image-2.6.32-27-generic-pae, linux-image-2.6.35-24-powerpc, linux-image-2.6.31-22-virtual, linux-image-2.6.31-22-386, linux-image-2.6.31-22-powerpc-smp, linux-image-2.6.32-27-386, linux-image-2.6.31-307-ec2, linux-image-2.6.35-24-generic-pae, linux-image-2.6.35-24-omap, linux-image-2.6.35-24-powerpc64-smp, linux, linux-image-2.6.31-22-server, linux-image-2.6.31-22-powerpc64-smp, linux-image-2.6.31-22-generic-pae, linux-image-2.6.32-27-ia64, linux-image-2.6.31-22-sparc64-smp, linux-image-2.6.35-24-generic, linux-image-2.6.31-22-ia64, linux-image-2.6.32-27-virtual, linux-image-2.6.35-24-versatile, linux-image-2.6.35-24-virtual, linux-image-2.6.31-22-powerpc, linux-image-2.6.32-27-powerpc-smp, linux-image-2.6.35-24-powerpc-smp, linux-image-2.6.32-27-powerpc64-smp, linux-image-2.6.32-27-preempt, linux-image-2.6.32-27-server, linux-image-2.6.32-27-sparc64-smp, linux-image-2.6.35-24-server, linux-image-2.6.32-311-ec2, linux-image-2.6.31-22-generic, linux-image-2.6.32-27-generic, linux-image-2.6.32-27-versatile, linux-image-2.6.32-27-sparc64, linux-ec2, linux-image-2.6.32-27-powerpc
  • USN-1093-1: linux-image-2.6.32-216-dove, linux-mvl-dove, linux-image-2.6.32-416-dove
  • USN-1160-1: linux-image-2.6.35-30-generic, linux-image-2.6.35-30-virtual, linux-image-2.6.35-30-powerpc-smp, linux-image-2.6.35-30-omap, linux-image-2.6.35-30-versatile, linux, linux-image-2.6.35-30-powerpc, linux-image-2.6.35-30-powerpc64-smp, linux-image-2.6.35-30-generic-pae, linux-image-2.6.35-30-server
  • USN-1141-1: linux-image-2.6.32-32-ia64, linux-image-2.6.32-32-386, linux-image-2.6.32-32-powerpc, linux-image-2.6.32-32-sparc64-smp, linux-image-2.6.32-32-generic-pae, linux-image-2.6.32-316-ec2, linux-image-2.6.32-32-powerpc64-smp, linux-image-2.6.32-32-preempt, linux-image-2.6.32-32-versatile, linux-image-2.6.32-32-virtual, linux-image-2.6.32-32-powerpc-smp, linux, linux-image-2.6.32-32-generic, linux-image-2.6.32-32-server, linux-image-2.6.32-32-sparc64, linux-ec2, linux-image-2.6.32-32-lpia
  • USN-1187-1: linux-lts-backport-maverick, linux-image-2.6.35-30-generic, linux-image-2.6.35-30-virtual, linux-image-2.6.35-30-generic-pae, linux-image-2.6.35-30-server
  • USN-1162-1: linux-mvl-dove, linux-image-2.6.32-217-dove
  • USN-1167-1: linux-image-2.6.38-10-generic-pae, linux-image-2.6.38-10-generic, linux-image-2.6.38-10-powerpc64-smp, linux-image-2.6.38-10-powerpc, linux-image-2.6.38-10-server, linux, linux-image-2.6.38-10-virtual, linux-image-2.6.38-10-versatile, linux-image-2.6.38-10-omap, linux-image-2.6.38-10-powerpc-smp
  • USN-1212-1: linux-ti-omap4, linux-image-2.6.38-1209-omap4
  • USN-1159-1: linux-mvl-dove, linux-image-2.6.32-417-dove
  • USN-1111-1: linux-image-2.6.15-57-mckinley-smp, linux-image-2.6.15-57-hppa64, linux-image-2.6.15-57-server-bigiron, linux-image-2.6.15-57-amd64-k8, linux-image-2.6.15-57-686, linux-image-2.6.15-57-server, linux-image-2.6.15-57-amd64-xeon, linux-image-2.6.15-57-sparc64, linux-image-2.6.15-57-sparc64-smp, linux-image-2.6.15-57-itanium-smp, linux-image-2.6.15-57-k7, linux-image-2.6.15-57-mckinley, linux-image-2.6.15-57-powerpc64-smp, linux-image-2.6.15-57-powerpc-smp, linux-image-2.6.15-57-amd64-server, linux-image-2.6.15-57-386, linux-image-2.6.15-57-powerpc, linux-image-2.6.15-57-amd64-generic, linux-image-2.6.15-57-itanium, linux-image-2.6.15-57-hppa32-smp, linux-source-2.6.15, linux-image-2.6.15-57-hppa64-smp, linux-image-2.6.15-57-hppa32
  • USN-1204-1: linux-image-2.6.31-610-imx51, linux-fsl-imx51
  • USN-1168-1: linux-image-2.6.32-33-preempt, linux-image-2.6.32-33-386, linux-image-2.6.32-33-generic, linux-image-2.6.32-33-generic-pae, linux-image-2.6.32-33-server, linux-image-2.6.32-33-lpia, linux-image-2.6.32-33-versatile, linux-image-2.6.32-33-sparc64-smp, linux-image-2.6.32-33-virtual, linux, linux-image-2.6.32-33-ia64, linux-image-2.6.32-33-sparc64, linux-image-2.6.32-33-powerpc-smp, linux-image-2.6.32-33-powerpc, linux-image-2.6.32-33-powerpc64-smp
  • USN-1161-1: linux-image-2.6.32-317-ec2, linux-ec2