Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.69354
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-1090-1 (linux)
Summary:NOSUMMARY
Description:Description:
The remote host is missing an update to linux
announced via advisory USN-1090-1.

Details follow:

Dan Rosenberg discovered that multiple terminal ioctls did not correctly
initialize structure memory. A local attacker could exploit this to read
portions of kernel stack memory, leading to a loss of privacy.
(CVE-2010-4076, CVE-2010-4077)

Dan Rosenberg discovered that the socket filters did not correctly
initialize structure memory. A local attacker could create malicious
filters to read portions of kernel stack memory, leading to a loss of
privacy. (Ubuntu 10.10 was already fixed in a prior update.) (CVE-2010-4158)

Dan Rosenberg discovered that the SCSI subsystem did not correctly validate
iov segments. A local attacker with access to a SCSI device could send
specially crafted requests to crash the system, leading to a denial of
service. (CVE-2010-4163)

Dan Rosenberg discovered that the RDS protocol did not correctly check
ioctl arguments. A local attacker could exploit this to crash the system,
leading to a denial of service. (CVE-2010-4175)

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 10.04 LTS:
linux-image-2.6.32-30-386 2.6.32-30.59
linux-image-2.6.32-30-generic 2.6.32-30.59
linux-image-2.6.32-30-generic-pae 2.6.32-30.59
linux-image-2.6.32-30-ia64 2.6.32-30.59
linux-image-2.6.32-30-lpia 2.6.32-30.59
linux-image-2.6.32-30-powerpc 2.6.32-30.59
linux-image-2.6.32-30-powerpc-smp 2.6.32-30.59
linux-image-2.6.32-30-powerpc64-smp 2.6.32-30.59
linux-image-2.6.32-30-preempt 2.6.32-30.59
linux-image-2.6.32-30-server 2.6.32-30.59
linux-image-2.6.32-30-sparc64 2.6.32-30.59
linux-image-2.6.32-30-sparc64-smp 2.6.32-30.59
linux-image-2.6.32-30-versatile 2.6.32-30.59
linux-image-2.6.32-30-virtual 2.6.32-30.59

Ubuntu 10.10:
linux-image-2.6.35-28-generic 2.6.35-28.49
linux-image-2.6.35-28-generic-pae 2.6.35-28.49
linux-image-2.6.35-28-omap 2.6.35-28.49
linux-image-2.6.35-28-powerpc 2.6.35-28.49
linux-image-2.6.35-28-powerpc-smp 2.6.35-28.49
linux-image-2.6.35-28-powerpc64-smp 2.6.35-28.49
linux-image-2.6.35-28-server 2.6.35-28.49
linux-image-2.6.35-28-versatile 2.6.35-28.49
linux-image-2.6.35-28-virtual 2.6.35-28.49

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

http://www.securityspace.com/smysecure/catid.html?in=USN-1090-1

Risk factor : Medium

CVSS Score:
4.9

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-4076
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d281da7ff6f70efca0553c288bb883e8605b3862
http://lkml.org/lkml/2010/9/15/389
http://www.openwall.com/lists/oss-security/2010/09/25/2
http://www.openwall.com/lists/oss-security/2010/10/06/6
http://www.openwall.com/lists/oss-security/2010/10/07/1
http://www.openwall.com/lists/oss-security/2010/10/25/3
Common Vulnerability Exposure (CVE) ID: CVE-2010-4077
BugTraq ID: 45059
http://www.securityfocus.com/bid/45059
http://lkml.indiana.edu/hypermail//linux/kernel/1009.1/03387.html
http://www.redhat.com/support/errata/RHSA-2010-0958.html
http://www.redhat.com/support/errata/RHSA-2011-0007.html
http://secunia.com/advisories/42890
http://securityreason.com/securityalert/8129
Common Vulnerability Exposure (CVE) ID: CVE-2010-4158
20101109 Kernel 0-day
http://lists.grok.org.uk/pipermail/full-disclosure/2010-November/077321.html
http://www.securityfocus.com/archive/1/514705
20101118 Re: Kernel 0-day
http://www.securityfocus.com/archive/1/514845
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
http://www.securityfocus.com/archive/1/520102/100/0/threaded
42745
http://secunia.com/advisories/42745
42778
http://secunia.com/advisories/42778
42801
http://secunia.com/advisories/42801
42884
http://secunia.com/advisories/42884
42890
42932
http://secunia.com/advisories/42932
42963
http://secunia.com/advisories/42963
43291
http://secunia.com/advisories/43291
44758
http://www.securityfocus.com/bid/44758
46397
http://secunia.com/advisories/46397
ADV-2010-3321
http://www.vupen.com/english/advisories/2010/3321
ADV-2011-0012
http://www.vupen.com/english/advisories/2011/0012
ADV-2011-0124
http://www.vupen.com/english/advisories/2011/0124
ADV-2011-0168
http://www.vupen.com/english/advisories/2011/0168
ADV-2011-0298
http://www.vupen.com/english/advisories/2011/0298
ADV-2011-0375
http://www.vupen.com/english/advisories/2011/0375
FEDORA-2010-18983
http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
MDVSA-2011:029
http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
RHSA-2010:0958
RHSA-2011:0007
RHSA-2011:0017
http://www.redhat.com/support/errata/RHSA-2011-0017.html
RHSA-2011:0162
http://www.redhat.com/support/errata/RHSA-2011-0162.html
SUSE-SA:2010:060
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
SUSE-SA:2011:001
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
SUSE-SA:2011:002
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
SUSE-SA:2011:004
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
SUSE-SA:2011:007
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
SUSE-SA:2011:008
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
[netdev] 20101109 [PATCH] Prevent reading uninitialized memory with socket filters
http://www.spinics.net/lists/netdev/msg146361.html
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=57fe93b374a6b8711995c2d466c502af9f3a08bb
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
http://www.vmware.com/security/advisories/VMSA-2011-0012.html
https://bugzilla.redhat.com/show_bug.cgi?id=651698
Common Vulnerability Exposure (CVE) ID: CVE-2010-4163
44793
http://www.securityfocus.com/bid/44793
[oss-security] 20101110 CVE request: kernel: Multiple DoS issues in block layer
http://openwall.com/lists/oss-security/2010/11/10/18
[oss-security] 20101112 Re: CVE request: kernel: Multiple DoS issues in block layer
http://openwall.com/lists/oss-security/2010/11/12/2
[oss-security] 20101129 Re: CVE request: kernel: Multiple DoS issues in block layer
http://openwall.com/lists/oss-security/2010/11/29/1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9284bcf4e335e5f18a8bc7b26461c33ab60d0689
https://bugzilla.redhat.com/show_bug.cgi?id=652957
Common Vulnerability Exposure (CVE) ID: CVE-2010-4175
44921
http://www.securityfocus.com/bid/44921
[linux-netdev] 20101117 [PATCH] Integer overflow in RDS cmsg handling
http://marc.info/?l=linux-netdev&m=129001184803080&w=2
[oss-security] 20101117 CVE request: kernel: integer overflow in RDS
http://www.openwall.com/lists/oss-security/2010/11/17/8
[oss-security] 20101118 Re: CVE request: kernel: integer overflow in RDS
http://www.openwall.com/lists/oss-security/2010/11/18/1
kernel-rdscmsgrdmaargs-dos(64618)
https://exchange.xforce.ibmcloud.com/vulnerabilities/64618
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.