USN-577-1: Linux kernel vulnerability

12 February 2008

Linux kernel vulnerability

Releases

Packages

  • linux-source-2.6.17 -
  • linux-source-2.6.20 -
  • linux-source-2.6.22 -

Details

Wojciech Purczynski discovered that the vmsplice system call did
not properly perform verification of user-memory pointers. A local
attacker could exploit this to overwrite arbitrary kernel memory
and gain root privileges. (CVE-2008-0600)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 7.10
Ubuntu 7.04
Ubuntu 6.10

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

References