Friday, September 6, 2013

[USN-1940-1] Linux kernel (EC2) vulnerabilities

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/
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=KVKa
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1940-1
September 06, 2013

linux-ec2 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 10.04 LTS

Summary:

Several security issues were fixed in the kernel.

Software Description:
- linux-ec2: Linux kernel for EC2

Details:

Vasily Kulikov discovered a flaw in the Linux Kernel's perf tool that
allows for privilege escalation. A local user could exploit this flaw to
run commands as root when using the perf tool. (CVE-2013-1060)

Michael S. Tsirkin discovered a flaw in how the Linux kernel's KVM
subsystem allocates memory slots for the guest's address space. A local
user could exploit this flaw to gain system privileges or obtain sensitive
information from kernel memory. (CVE-2013-1943)

A flaw was discovered in the SCTP (stream control transfer protocol)
network protocol's handling of duplicate cookies in the Linux kernel. A
remote attacker could exploit this flaw to cause a denial of service
(system crash) on another remote user querying the SCTP connection.
(CVE-2013-2206)

Hannes Frederic Sowa discovered a flaw in setsockopt UDP_CORK option in the
Linux kernel's IPv6 stack. A local user could exploit this flaw to cause a
denial of service (system crash). (CVE-2013-4162)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 10.04 LTS:
linux-image-2.6.32-356-ec2 2.6.32-356.69

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References:
http://www.ubuntu.com/usn/usn-1940-1
CVE-2013-1060, CVE-2013-1943, CVE-2013-2206, CVE-2013-4162

Package Information:
https://launchpad.net/ubuntu/+source/linux-ec2/2.6.32-356.69

No comments:

Post a Comment