USN-518-1: linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20 vulnerabilities

25 September 2007

linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20 vulnerabilities

Releases

Packages

  • linux-source-2.6.15 -
  • linux-source-2.6.17 -
  • linux-source-2.6.20 -

Details

Evan Teran discovered that the Linux kernel ptrace routines did not
correctly handle certain requests robustly. Local attackers could exploit
this to crash the system, causing a denial of service. (CVE-2007-3731)

It was discovered that hugetlb kernels on PowerPC systems did not prevent
the stack from colliding with reserved kernel memory. Local attackers
could exploit this and crash the system, causing a denial of service.
(CVE-2007-3739)

It was discovered that certain CIFS filesystem actions did not honor
the umask of a process. Local attackers could exploit this to gain
additional privileges. (CVE-2007-3740)

Wojciech Purczynski discovered that the Linux kernel ia32 syscall
emulation in x86_64 kernels did not correctly clear the high bits of
registers. Local attackers could exploit this to gain root privileges.
(CVE-2007-4573)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 7.04
Ubuntu 6.10
Ubuntu 6.06

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.