First published: Fri Feb 25 2011(Updated: )
Tavis Ormandy discovered that the Linux kernel did not properly implement exception fixup. A local attacker could exploit this to crash the kernel, leading to a denial of service. (CVE-2010-3086) Dan Rosenberg discovered that the Linux kernel TIPC implementation contained multiple integer signedness errors. A local attacker could exploit this to gain root privileges. (CVE-2010-3859) Dan Rosenberg discovered that the Linux kernel X.25 implementation incorrectly parsed facilities. A remote attacker could exploit this to crash the kernel, leading to a denial of service. (CVE-2010-3873) Vasiliy Kulikov discovered that the Linux kernel X.25 implementation did not correctly clear kernel memory. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy. (CVE-2010-3875) Vasiliy Kulikov discovered that the Linux kernel sockets implementation did not properly initialize certain structures. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy. (CVE-2010-3876) Nelson Elhage discovered that the Linux kernel IPv4 implementation did not properly audit certain bytecodes in netlink messages. A local attacker could exploit this to cause the kernel to hang, leading to a denial of service. (CVE-2010-3880) Dan Rosenberg discovered that the SiS video driver did not correctly clear kernel memory. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy. (CVE-2010-4078) Dan Rosenberg discovered that the RME Hammerfall DSP audio interface driver did not correctly clear kernel memory. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy. (CVE-2010-4080, CVE-2010-4081) Dan Rosenberg discovered that the semctl syscall did not correctly clear kernel memory. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy. (CVE-2010-4083) James Bottomley discovered that the ICP vortex storage array controller driver did not validate certain sizes. A local attacker on a 64bit system could exploit this to crash the kernel, leading to a denial of service. (CVE-2010-4157) Dan Rosenberg discovered that the Linux kernel L2TP implementation contained multiple integer signedness errors. A local attacker could exploit this to to crash the kernel, or possibly gain root privileges. (CVE-2010-4160)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-2.6.15-55-hppa64 | <2.6.15-55.93 | 2.6.15-55.93 |
Ubuntu gir1.2-packagekitglib-1.0 | =6.06 | |
All of | ||
ubuntu/linux-image-2.6.15-55-mckinley | <2.6.15-55.93 | 2.6.15-55.93 |
Ubuntu gir1.2-packagekitglib-1.0 | =6.06 | |
All of | ||
ubuntu/linux-image-2.6.15-55-powerpc-smp | <2.6.15-55.93 | 2.6.15-55.93 |
Ubuntu gir1.2-packagekitglib-1.0 | =6.06 | |
All of | ||
ubuntu/linux-image-2.6.15-55-hppa32-smp | <2.6.15-55.93 | 2.6.15-55.93 |
Ubuntu gir1.2-packagekitglib-1.0 | =6.06 | |
All of | ||
ubuntu/linux-image-2.6.15-55-686 | <2.6.15-55.93 | 2.6.15-55.93 |
Ubuntu gir1.2-packagekitglib-1.0 | =6.06 | |
All of | ||
ubuntu/linux-image-2.6.15-55-amd64-k8 | <2.6.15-55.93 | 2.6.15-55.93 |
Ubuntu gir1.2-packagekitglib-1.0 | =6.06 | |
All of | ||
ubuntu/linux-image-2.6.15-55-amd64-server | <2.6.15-55.93 | 2.6.15-55.93 |
Ubuntu gir1.2-packagekitglib-1.0 | =6.06 | |
All of | ||
ubuntu/linux-image-2.6.15-55-386 | <2.6.15-55.93 | 2.6.15-55.93 |
Ubuntu gir1.2-packagekitglib-1.0 | =6.06 | |
All of | ||
ubuntu/linux-image-2.6.15-55-sparc64-smp | <2.6.15-55.93 | 2.6.15-55.93 |
Ubuntu gir1.2-packagekitglib-1.0 | =6.06 | |
All of | ||
ubuntu/linux-image-2.6.15-55-k7 | <2.6.15-55.93 | 2.6.15-55.93 |
Ubuntu gir1.2-packagekitglib-1.0 | =6.06 | |
All of | ||
ubuntu/linux-image-2.6.15-55-sparc64 | <2.6.15-55.93 | 2.6.15-55.93 |
Ubuntu gir1.2-packagekitglib-1.0 | =6.06 | |
All of | ||
ubuntu/linux-image-2.6.15-55-server | <2.6.15-55.93 | 2.6.15-55.93 |
Ubuntu gir1.2-packagekitglib-1.0 | =6.06 | |
All of | ||
ubuntu/linux-image-2.6.15-55-powerpc64-smp | <2.6.15-55.93 | 2.6.15-55.93 |
Ubuntu gir1.2-packagekitglib-1.0 | =6.06 | |
All of | ||
ubuntu/linux-image-2.6.15-55-hppa32 | <2.6.15-55.93 | 2.6.15-55.93 |
Ubuntu gir1.2-packagekitglib-1.0 | =6.06 | |
All of | ||
ubuntu/linux-image-2.6.15-55-mckinley-smp | <2.6.15-55.93 | 2.6.15-55.93 |
Ubuntu gir1.2-packagekitglib-1.0 | =6.06 | |
All of | ||
ubuntu/linux-image-2.6.15-55-server-bigiron | <2.6.15-55.93 | 2.6.15-55.93 |
Ubuntu gir1.2-packagekitglib-1.0 | =6.06 | |
All of | ||
ubuntu/linux-image-2.6.15-55-itanium-smp | <2.6.15-55.93 | 2.6.15-55.93 |
Ubuntu gir1.2-packagekitglib-1.0 | =6.06 | |
All of | ||
ubuntu/linux-image-2.6.15-55-amd64-xeon | <2.6.15-55.93 | 2.6.15-55.93 |
Ubuntu gir1.2-packagekitglib-1.0 | =6.06 | |
All of | ||
ubuntu/linux-image-2.6.15-55-powerpc | <2.6.15-55.93 | 2.6.15-55.93 |
Ubuntu gir1.2-packagekitglib-1.0 | =6.06 | |
All of | ||
ubuntu/linux-image-2.6.15-55-amd64-generic | <2.6.15-55.93 | 2.6.15-55.93 |
Ubuntu gir1.2-packagekitglib-1.0 | =6.06 | |
All of | ||
ubuntu/linux-image-2.6.15-55-hppa64-smp | <2.6.15-55.93 | 2.6.15-55.93 |
Ubuntu gir1.2-packagekitglib-1.0 | =6.06 | |
All of | ||
ubuntu/linux-image-2.6.15-55-itanium | <2.6.15-55.93 | 2.6.15-55.93 |
Ubuntu gir1.2-packagekitglib-1.0 | =6.06 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
USN-1071-1 is categorized as a denial of service vulnerability due to improper exception handling in the Linux kernel.
To fix USN-1071-1, update the affected Linux kernel packages to version 2.6.15-55.93 or later.
USN-1071-1 affects Ubuntu 6.06 specifically.
No, USN-1071-1 requires local access for exploitation.
USN-1071-1 impacts the kernel's exception handling mechanism, specifically in the TIPC implementation.