Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.69137
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-1081-1 (linux)
Summary:NOSUMMARY
Description:Description:
The remote host is missing an update to linux
announced via advisory USN-1081-1.

Details follow:

It was discovered that KVM did not correctly initialize certain CPU
registers. A local attacker could exploit this to crash the system, leading
to a denial of service. (CVE-2010-3698)

Thomas Pollet discovered that the RDS network protocol did not check
certain iovec buffers. A local attacker could exploit this to crash the
system or possibly execute arbitrary code as the root user. (CVE-2010-3865)

Vasiliy Kulikov discovered that the Linux kernel X.25 implementation did
not correctly clear kernel memory. A local attacker could exploit this to
read kernel stack memory, leading to a loss of privacy. (CVE-2010-3875)

Vasiliy Kulikov discovered that the Linux kernel sockets implementation did
not properly initialize certain structures. A local attacker could exploit
this to read kernel stack memory, leading to a loss of privacy.
(CVE-2010-3876)

Vasiliy Kulikov discovered that the TIPC interface did not correctly
initialize certain structures. A local attacker could exploit this to read
kernel stack memory, leading to a loss of privacy. (CVE-2010-3877)

Nelson Elhage discovered that the Linux kernel IPv4 implementation did not
properly audit certain bytecodes in netlink messages. A local attacker
could exploit this to cause the kernel to hang, leading to a denial of
service. (CVE-2010-3880)

Dan Rosenberg discovered that the ivtv V4L driver did not correctly
initialize certian structures. A local attacker could exploit this to read
kernel stack memory, leading to a loss of privacy. (CVE-2010-4079)

Dan Rosenberg discovered that the semctl syscall did not correctly clear
kernel memory. A local attacker could exploit this to read kernel stack
memory, leading to a loss of privacy. (CVE-2010-4083)

It was discovered that multithreaded exec did not handle CPU timers
correctly. A local attacker could exploit this to crash the system, leading
to a denial of service. (CVE-2010-4248)

Nelson Elhage discovered that Econet did not correctly handle AUN packets
over UDP. A local attacker could send specially crafted traffic to crash
the system, leading to a denial of service. (CVE-2010-4342)

Tavis Ormandy discovered that the install_special_mapping function could
bypass the mmap_min_addr restriction. A local attacker could exploit this
to mmap 4096 bytes below the mmap_min_addr area, possibly improving the
chances of performing NULL pointer dereference attacks. (CVE-2010-4346)

Dan Rosenberg discovered that the OSS subsystem did not handle name
termination correctly. A local attacker could exploit this crash the system
or gain root privileges. (CVE-2010-4527)

Dan Carpenter discovered that the Infiniband driver did not correctly
handle certain requests. A local user could exploit this to crash the
system or potentially gain root privileges. (CVE-2010-4649, CVE-2011-1044)

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 10.10:
linux-image-2.6.35-27-generic 2.6.35-27.48
linux-image-2.6.35-27-generic-pae 2.6.35-27.48
linux-image-2.6.35-27-omap 2.6.35-27.48
linux-image-2.6.35-27-powerpc 2.6.35-27.48
linux-image-2.6.35-27-powerpc-smp 2.6.35-27.48
linux-image-2.6.35-27-powerpc64-smp 2.6.35-27.48
linux-image-2.6.35-27-server 2.6.35-27.48
linux-image-2.6.35-27-versatile 2.6.35-27.48
linux-image-2.6.35-27-virtual 2.6.35-27.48

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

http://www.securityspace.com/smysecure/catid.html?in=USN-1081-1

Risk factor : High

CVSS Score:
7.2

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-3698
42745
http://secunia.com/advisories/42745
44500
http://www.securityfocus.com/bid/44500
ADV-2010-3123
http://www.vupen.com/english/advisories/2010/3123
ADV-2010-3321
http://www.vupen.com/english/advisories/2010/3321
FEDORA-2010-18983
http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
MDVSA-2011:029
http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
RHSA-2010:0842
http://www.redhat.com/support/errata/RHSA-2010-0842.html
RHSA-2010:0898
http://www.redhat.com/support/errata/RHSA-2010-0898.html
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9581d442b9058d3699b4be568b6e5eae38a41493
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
https://bugzilla.redhat.com/show_bug.cgi?id=639879
Common Vulnerability Exposure (CVE) ID: CVE-2010-3865
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
http://www.securityfocus.com/archive/1/520102/100/0/threaded
42778
http://secunia.com/advisories/42778
42789
http://secunia.com/advisories/42789
42801
http://secunia.com/advisories/42801
42890
http://secunia.com/advisories/42890
44549
http://www.securityfocus.com/bid/44549
46397
http://secunia.com/advisories/46397
ADV-2011-0012
http://www.vupen.com/english/advisories/2011/0012
ADV-2011-0024
http://www.vupen.com/english/advisories/2011/0024
ADV-2011-0298
http://www.vupen.com/english/advisories/2011/0298
RHSA-2011:0004
http://www.redhat.com/support/errata/RHSA-2011-0004.html
RHSA-2011:0007
http://www.redhat.com/support/errata/RHSA-2011-0007.html
SUSE-SA:2010:057
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00004.html
SUSE-SA:2011:001
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
SUSE-SA:2011:002
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
SUSE-SA:2011:007
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
[netdev] 20101028 Re: [Security] TIPC security issues
http://www.spinics.net/lists/netdev/msg145359.html
http://www.spinics.net/lists/netdev/msg145397.html
[oss-security] 20101029 CVE request: kernel: iovec overflow in rds_rdma_pages()
http://www.openwall.com/lists/oss-security/2010/10/29/1
[oss-security] 20101101 Re: CVE request: kernel: iovec overflow in rds_rdma_pages()
http://www.openwall.com/lists/oss-security/2010/11/01/1
http://www.vmware.com/security/advisories/VMSA-2011-0012.html
kernel-rdsrdmapages-overflow(62881)
https://exchange.xforce.ibmcloud.com/vulnerabilities/62881
Common Vulnerability Exposure (CVE) ID: CVE-2010-3875
44630
http://www.securityfocus.com/bid/44630
DSA-2126
http://www.debian.org/security/2010/dsa-2126
MDVSA-2011:051
http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
[netdev] 20101031 [PATCH 1/3] net: ax25: fix information leak to userland
http://marc.info/?l=linux-netdev&m=128854507120898&w=2
[oss-security] 20101102 CVE request: kernel stack infoleaks
http://openwall.com/lists/oss-security/2010/11/02/7
[oss-security] 20101104 Re: CVE request: kernel stack infoleaks
http://openwall.com/lists/oss-security/2010/11/04/5
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fe10ae53384e48c51996941b7720ee16995cbcb7
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2
https://bugzilla.redhat.com/show_bug.cgi?id=649713
Common Vulnerability Exposure (CVE) ID: CVE-2010-3876
42963
http://secunia.com/advisories/42963
ADV-2011-0168
http://www.vupen.com/english/advisories/2011/0168
RHSA-2010:0958
http://www.redhat.com/support/errata/RHSA-2010-0958.html
RHSA-2011:0162
http://www.redhat.com/support/errata/RHSA-2011-0162.html
[netdev] 20101031 [PATCH 2/3] net: packet: fix information leak to userland
http://marc.info/?l=linux-netdev&m=128854507220908&w=2
[oss-security] 20101102 Re: CVE request: kernel stack infoleaks
http://openwall.com/lists/oss-security/2010/11/02/10
http://openwall.com/lists/oss-security/2010/11/02/12
http://openwall.com/lists/oss-security/2010/11/02/9
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=67286640f638f5ad41a946b9a3dc75327950248f
https://bugzilla.redhat.com/show_bug.cgi?id=649715
Common Vulnerability Exposure (CVE) ID: CVE-2010-3877
42884
http://secunia.com/advisories/42884
RHSA-2011:0017
http://www.redhat.com/support/errata/RHSA-2011-0017.html
[netdev] 20101031 [PATCH 3/3] net: tipc: fix information leak to userland
http://marc.info/?l=linux-netdev&m=128854507420917&w=2
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=88f8a5e3e7defccd3925cabb1ee4d3994e5cdb52
https://bugzilla.redhat.com/show_bug.cgi?id=649717
kernel-getname-info-disc(64578)
https://exchange.xforce.ibmcloud.com/vulnerabilities/64578
Common Vulnerability Exposure (CVE) ID: CVE-2010-3880
42126
http://secunia.com/advisories/42126
44665
http://www.securityfocus.com/bid/44665
[netdev] 20101103 [PATCH 2/2] inet_diag: Make sure we actually run the same bytecode we audited.
http://www.spinics.net/lists/netdev/msg145899.html
[oss-security] 20101104 CVE request: kernel: logic error in INET_DIAG bytecode auditing
http://openwall.com/lists/oss-security/2010/11/04/9
[oss-security] 20101105 Re: CVE request: kernel: logic error in INET_DIAG bytecode auditing
http://openwall.com/lists/oss-security/2010/11/05/3
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=22e76c849d505d87c5ecf3d3e6742a65f0ff4860
https://bugzilla.redhat.com/show_bug.cgi?id=651264
Common Vulnerability Exposure (CVE) ID: CVE-2010-4079
BugTraq ID: 45062
http://www.securityfocus.com/bid/45062
Debian Security Information: DSA-2126 (Google Search)
http://lkml.org/lkml/2010/9/15/393
http://www.openwall.com/lists/oss-security/2010/09/25/2
http://www.openwall.com/lists/oss-security/2010/10/06/6
http://www.openwall.com/lists/oss-security/2010/10/07/1
http://www.openwall.com/lists/oss-security/2010/10/25/3
Common Vulnerability Exposure (CVE) ID: CVE-2010-4083
BugTraq ID: 43809
http://www.securityfocus.com/bid/43809
Bugtraq: 20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (Google Search)
http://www.spinics.net/lists/mm-commits/msg80234.html
http://secunia.com/advisories/42932
http://secunia.com/advisories/43291
SuSE Security Announcement: SUSE-SA:2010:060 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
SuSE Security Announcement: SUSE-SA:2011:001 (Google Search)
SuSE Security Announcement: SUSE-SA:2011:004 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
SuSE Security Announcement: SUSE-SA:2011:007 (Google Search)
SuSE Security Announcement: SUSE-SA:2011:008 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
http://www.vupen.com/english/advisories/2011/0124
http://www.vupen.com/english/advisories/2011/0375
Common Vulnerability Exposure (CVE) ID: CVE-2010-4248
45028
http://www.securityfocus.com/bid/45028
[oss-security] 20101123 CVE request: kernel: posix-cpu-timers: workaround to suppress the problems with mt exec
http://www.openwall.com/lists/oss-security/2010/11/23/2
[oss-security] 20101124 Re: CVE request: kernel: posix-cpu-timers: workaround to suppress the problems with mt exec
http://www.openwall.com/lists/oss-security/2010/11/24/9
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e0a70217107e6f9844628120412cb27bb4cea194
https://bugzilla.redhat.com/show_bug.cgi?id=656264
Common Vulnerability Exposure (CVE) ID: CVE-2010-4342
43291
45321
http://www.securityfocus.com/bid/45321
ADV-2011-0375
SUSE-SA:2011:008
[netdev] 20101209 NULL dereference in econet AUN-over-UDP receive
http://marc.info/?l=linux-netdev&m=129185496013580&w=2
[netdev] 20101209 Re: NULL dereference in econet AUN-over-UDP receive
http://marc.info/?l=linux-netdev&m=129186011218615&w=2
[oss-security] 20101208 CVE request: kernel: NULL pointer dereference in AF_ECONET
http://openwall.com/lists/oss-security/2010/12/09/1
[oss-security] 20101209 Re: CVE request: kernel: NULL pointer dereference in AF_ECONET
http://openwall.com/lists/oss-security/2010/12/09/2
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4e085e76cbe558b79b54cbab772f61185879bc64
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc6
Common Vulnerability Exposure (CVE) ID: CVE-2010-4346
42570
http://secunia.com/advisories/42570
45323
http://www.securityfocus.com/bid/45323
[linux-kernel] 20101209 [PATCH] install_special_mapping skips security_file_mmap check.
https://lkml.org/lkml/2010/12/9/222
[oss-security] 20101209 Re: [taviso@cmpxchg8b.com: [PATCH] install_special_mapping skips security_file_mmap check.]
http://openwall.com/lists/oss-security/2010/12/09/13
[oss-security] 20101209 [taviso@cmpxchg8b.com: [PATCH] install_special_mapping skips security_file_mmap check.]
http://openwall.com/lists/oss-security/2010/12/09/12
[oss-security] 20101210 Re: Subject: CVE request: kernel: install_special_mapping skips security_file_mmap check
http://openwall.com/lists/oss-security/2010/12/10/3
[oss-security] 20101210 Subject: CVE request: kernel: install_special_mapping skips security_file_mmap check
http://openwall.com/lists/oss-security/2010/12/10/2
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=462e635e5b73ba9a4c03913b77138cd57ce4b050
https://bugzilla.redhat.com/show_bug.cgi?id=662189
Common Vulnerability Exposure (CVE) ID: CVE-2010-4527
42765
http://secunia.com/advisories/42765
45629
http://www.securityfocus.com/bid/45629
[oss-security] 20101230 CVE request: kernel: buffer overflow in OSS load_mixer_volumes
http://openwall.com/lists/oss-security/2010/12/31/1
[oss-security] 20101231 Re: CVE request: kernel: buffer overflow in OSS load_mixer_volumes
http://openwall.com/lists/oss-security/2010/12/31/4
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d81a12bc29ae4038770e05dce4ab7f26fd5880fb
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37
http://xorl.wordpress.com/2011/01/09/cve-2010-4527-linux-kernel-oss-sound-card-driver-buffer-overflow/
https://bugzilla.redhat.com/show_bug.cgi?id=667615
Common Vulnerability Exposure (CVE) ID: CVE-2010-4649
46073
http://www.securityfocus.com/bid/46073
RHSA-2011:0927
http://rhn.redhat.com/errata/RHSA-2011-0927.html
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93
https://bugzilla.redhat.com/show_bug.cgi?id=667916
Common Vulnerability Exposure (CVE) ID: CVE-2011-1044
BugTraq ID: 46488
http://www.securityfocus.com/bid/46488
RedHat Security Advisories: RHSA-2011:0927
XForce ISS Database: kernel-ibuverbspollcq-info-disclosure(65563)
https://exchange.xforce.ibmcloud.com/vulnerabilities/65563
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.