First published: Tue Oct 25 2011(Updated: )
It was discovered that the security fix for CVE-2010-4250 introduced a regression. A remote attacker could exploit this to crash the system, leading to a denial of service. (CVE-2011-1479) Vasiliy Kulikov discovered that taskstats did not enforce access restrictions. A local attacker could exploit this to read certain information, leading to a loss of privacy. (CVE-2011-2494) Vasiliy Kulikov discovered that /proc/PID/io did not enforce access restrictions. A local attacker could exploit this to read certain information, leading to a loss of privacy. (CVE-2011-2495) It was discovered that the EXT4 filesystem contained multiple off-by-one flaws. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2011-2695) Christian Ohm discovered that the perf command looks for configuration files in the current directory. If a privileged user were tricked into running perf in a directory containing a malicious configuration file, an attacker could run arbitrary commands and possibly gain privileges. (CVE-2011-2905) Vasiliy Kulikov discovered that the Comedi driver did not correctly clear memory. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy. (CVE-2011-2909) Dan Kaminsky discovered that the kernel incorrectly handled random sequence number generation. An attacker could use this flaw to possibly predict sequence numbers and inject packets. (CVE-2011-3188) Yogesh Sharma discovered that CIFS did not correctly handle UNCs that had no prefixpaths. A local attacker with access to a CIFS partition could exploit this to crash the system, leading to a denial of service. (CVE-2011-3363)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-2.6.35-30-generic-pae | <2.6.35-30.61~lucid1 | 2.6.35-30.61~lucid1 |
Ubuntu gir1.2-packagekitglib-1.0 | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.35-30-server | <2.6.35-30.61~lucid1 | 2.6.35-30.61~lucid1 |
Ubuntu gir1.2-packagekitglib-1.0 | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.35-30-generic | <2.6.35-30.61~lucid1 | 2.6.35-30.61~lucid1 |
Ubuntu gir1.2-packagekitglib-1.0 | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.35-30-virtual | <2.6.35-30.61~lucid1 | 2.6.35-30.61~lucid1 |
Ubuntu gir1.2-packagekitglib-1.0 | =10.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
USN-1242-1 is considered a critical vulnerability as it can lead to a denial of service.
To fix USN-1242-1, update your Ubuntu system to the version 2.6.35-30.61~lucid1 or later.
USN-1242-1 addresses CVE-2011-1479 along with regressions related to previous security fixes.
Vasiliy Kulikov discovered the vulnerabilities reported in USN-1242-1.
USN-1242-1 applies to Ubuntu version 10.04 specifically for certain Linux image packages.