logo
DATABASE RESOURCES PRICING ABOUT US

Linux kernel vulnerabilities

Description

## Releases * Ubuntu 9.04 * Ubuntu 8.10 * Ubuntu 8.04 * Ubuntu 6.06 ## Packages * linux \- * linux-source-2.6.15 \- Igor Zhbanov discovered that NFS clients were able to create device nodes even when root_squash was enabled. An authenticated remote attacker could create device nodes with open permissions, leading to a loss of privacy or escalation of privileges. Only Ubuntu 8.10 and 9.04 were affected. (CVE-2009-1072) Dan Carpenter discovered that SELinux did not correctly handle certain network checks when running with compat_net=1. A local attacker could exploit this to bypass network checks. Default Ubuntu installations do not enable SELinux, and only Ubuntu 8.10 and 9.04 were affected. (CVE-2009-1184) Shaohua Li discovered that memory was not correctly initialized in the AGP subsystem. A local attacker could potentially read kernel memory, leading to a loss of privacy. (CVE-2009-1192) Benjamin Gilbert discovered that the VMX implementation of KVM did not correctly handle certain registers. An attacker in a guest VM could exploit this to cause a host system crash, leading to a denial of service. This only affected 32bit hosts. Ubuntu 6.06 was not affected. (CVE-2009-1242) Thomas Pollet discovered that the Amateur Radio X.25 Packet Layer Protocol did not correctly validate certain fields. A remote attacker could exploit this to read kernel memory, leading to a loss of privacy. (CVE-2009-1265) Trond Myklebust discovered that NFS did not correctly handle certain long filenames. An authenticated remote attacker could exploit this to cause a system crash, leading to a denial of service. Only Ubuntu 6.06 was affected. (CVE-2009-1336) Oleg Nesterov discovered that the kernel did not correctly handle CAP_KILL. A local user could exploit this to send signals to arbitrary processes, leading to a denial of service. (CVE-2009-1337) Daniel Hokka Zakrisson discovered that signal handling was not correctly limited to process namespaces. A local user could bypass namespace restrictions, possibly leading to a denial of service. Only Ubuntu 8.04 was affected. (CVE-2009-1338) Pavel Emelyanov discovered that network namespace support for IPv6 was not correctly handled. A remote attacker could send specially crafted IPv6 traffic that would cause a system crash, leading to a denial of service. Only Ubuntu 8.10 and 9.04 were affected. (CVE-2009-1360) Neil Horman discovered that the e1000 network driver did not correctly validate certain fields. A remote attacker could send a specially crafted packet that would cause a system crash, leading to a denial of service. (CVE-2009-1385) Pavan Naregundi discovered that CIFS did not correctly check lengths when handling certain mount requests. A remote attacker could send specially crafted traffic to cause a system crash, leading to a denial of service. (CVE-2009-1439) Simon Vallet and Frank Filz discovered that execute permissions were not correctly handled by NFSv4. A local user could bypass permissions and run restricted programs, possibly leading to an escalation of privileges. (CVE-2009-1630) Jeff Layton and Suresh Jayaraman discovered buffer overflows in the CIFS client code. A malicious remote server could exploit this to cause a system crash or execute arbitrary code as root. (CVE-2009-1633) Mikulas Patocka discovered that /proc/iomem was not correctly initialized on Sparc. A local attacker could use this file to crash the system, leading to a denial of service. Ubuntu 6.06 was not affected. (CVE-2009-1914) Miklos Szeredi discovered that OCFS2 did not correctly handle certain splice operations. A local attacker could exploit this to cause a system hang, leading to a denial of service. Ubuntu 6.06 was not affected. (CVE-2009-1961)


Affected Package


OS OS Version Package Name Package Version
Ubuntu 9.04 linux-image-2.6.28-13-iop32x 2.6.28-13.45
Ubuntu 9.04 linux-image-2.6.28-13-generic 2.6.28-13.45
Ubuntu 9.04 linux-image-2.6.28-13-ixp4xx 2.6.28-13.45
Ubuntu 9.04 linux-image-2.6.28-13-imx51 2.6.28-13.45
Ubuntu 9.04 linux-image-2.6.28-13-lpia 2.6.28-13.45
Ubuntu 9.04 linux-image-2.6.28-13-versatile 2.6.28-13.45
Ubuntu 9.04 linux-image-2.6.28-13-virtual 2.6.28-13.45
Ubuntu 9.04 linux-image-2.6.28-13-server 2.6.28-13.45
Ubuntu 8.10 linux-image-2.6.27-14-generic 2.6.27-14.35
Ubuntu 8.10 linux-image-2.6.27-14-server 2.6.27-14.35
Ubuntu 8.10 linux-image-2.6.27-14-virtual 2.6.27-14.35
Ubuntu 8.04 linux-image-2.6.24-24-sparc64 2.6.24-24.55
Ubuntu 8.04 linux-image-2.6.24-24-server 2.6.24-24.55
Ubuntu 8.04 linux-image-2.6.24-24-itanium 2.6.24-24.55
Ubuntu 8.04 linux-image-2.6.24-24-lpiacompat 2.6.24-24.55
Ubuntu 8.04 linux-image-2.6.24-24-hppa64 2.6.24-24.55
Ubuntu 8.04 linux-image-2.6.24-24-virtual 2.6.24-24.55
Ubuntu 8.04 linux-image-2.6.24-24-powerpc64-smp 2.6.24-24.55
Ubuntu 8.04 linux-image-2.6.24-24-386 2.6.24-24.55
Ubuntu 8.04 linux-image-2.6.24-24-generic 2.6.24-24.55
Ubuntu 8.04 linux-image-2.6.24-24-xen 2.6.24-24.55
Ubuntu 8.04 linux-image-2.6.24-24-powerpc-smp 2.6.24-24.55
Ubuntu 8.04 linux-image-2.6.24-24-rt 2.6.24-24.55
Ubuntu 8.04 linux-image-2.6.24-24-hppa32 2.6.24-24.55
Ubuntu 8.04 linux-image-2.6.24-24-lpia 2.6.24-24.55
Ubuntu 8.04 linux-image-2.6.24-24-mckinley 2.6.24-24.55
Ubuntu 8.04 linux-image-2.6.24-24-sparc64-smp 2.6.24-24.55
Ubuntu 8.04 linux-image-2.6.24-24-powerpc 2.6.24-24.55
Ubuntu 8.04 linux-image-2.6.24-24-openvz 2.6.24-24.55
Ubuntu 6.06 linux-image-2.6.15-54-hppa64 2.6.15-54.77
Ubuntu 6.06 linux-image-2.6.15-54-hppa32-smp 2.6.15-54.77
Ubuntu 6.06 linux-image-2.6.15-54-server-bigiron 2.6.15-54.77
Ubuntu 6.06 linux-image-2.6.15-54-amd64-generic 2.6.15-54.77
Ubuntu 6.06 linux-image-2.6.15-54-itanium 2.6.15-54.77
Ubuntu 6.06 linux-image-2.6.15-54-k7 2.6.15-54.77
Ubuntu 6.06 linux-image-2.6.15-54-powerpc-smp 2.6.15-54.77
Ubuntu 6.06 linux-image-2.6.15-54-server 2.6.15-54.77
Ubuntu 6.06 linux-image-2.6.15-54-amd64-server 2.6.15-54.77
Ubuntu 6.06 linux-image-2.6.15-54-sparc64-smp 2.6.15-54.77
Ubuntu 6.06 linux-image-2.6.15-54-sparc64 2.6.15-54.77
Ubuntu 6.06 linux-image-2.6.15-54-mckinley-smp 2.6.15-54.77
Ubuntu 6.06 linux-image-2.6.15-54-amd64-k8 2.6.15-54.77
Ubuntu 6.06 linux-image-2.6.15-54-386 2.6.15-54.77
Ubuntu 6.06 linux-image-2.6.15-54-mckinley 2.6.15-54.77
Ubuntu 6.06 linux-image-2.6.15-54-hppa32 2.6.15-54.77
Ubuntu 6.06 linux-image-2.6.15-54-amd64-xeon 2.6.15-54.77
Ubuntu 6.06 linux-image-2.6.15-54-powerpc 2.6.15-54.77
Ubuntu 6.06 linux-image-2.6.15-54-powerpc64-smp 2.6.15-54.77
Ubuntu 6.06 linux-image-2.6.15-54-itanium-smp 2.6.15-54.77
Ubuntu 6.06 linux-image-2.6.15-54-686 2.6.15-54.77
Ubuntu 6.06 linux-image-2.6.15-54-hppa64-smp 2.6.15-54.77

Related