Executive Summary

Summary
Title Linux kernel vulnerabilities
Informations
Name USN-311-1 First vendor Publication 2006-07-11
Vendor Ubuntu Last vendor Modification 2006-07-11
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:H/Au:N/C:C/I:N/A:C)
Cvss Base Score 5.6 Attack Range Local
Cvss Impact Score 9.2 Attack Complexity High
Cvss Expoit Score 1.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects the following Ubuntu releases:

Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the following package versions:

Ubuntu 5.04:
linux-image-2.6.10-6-386 2.6.10-34.21
linux-image-2.6.10-6-686 2.6.10-34.21
linux-image-2.6.10-6-686-smp 2.6.10-34.21
linux-image-2.6.10-6-amd64-generic 2.6.10-34.21
linux-image-2.6.10-6-amd64-k8 2.6.10-34.21
linux-image-2.6.10-6-amd64-k8-smp 2.6.10-34.21
linux-image-2.6.10-6-amd64-xeon 2.6.10-34.21
linux-image-2.6.10-6-hppa32 2.6.10-34.21
linux-image-2.6.10-6-hppa32-smp 2.6.10-34.21
linux-image-2.6.10-6-hppa64 2.6.10-34.21
linux-image-2.6.10-6-hppa64-smp 2.6.10-34.21
linux-image-2.6.10-6-itanium 2.6.10-34.21
linux-image-2.6.10-6-itanium-smp 2.6.10-34.21
linux-image-2.6.10-6-k7 2.6.10-34.21
linux-image-2.6.10-6-k7-smp 2.6.10-34.21
linux-image-2.6.10-6-mckinley 2.6.10-34.21
linux-image-2.6.10-6-mckinley-smp 2.6.10-34.21
linux-image-2.6.10-6-power3 2.6.10-34.21
linux-image-2.6.10-6-power3-smp 2.6.10-34.21
linux-image-2.6.10-6-power4 2.6.10-34.21
linux-image-2.6.10-6-power4-smp 2.6.10-34.21
linux-image-2.6.10-6-powerpc 2.6.10-34.21
linux-image-2.6.10-6-powerpc-smp 2.6.10-34.21
linux-image-2.6.10-6-sparc64 2.6.10-34.21
linux-image-2.6.10-6-sparc64-smp 2.6.10-34.21
linux-patch-ubuntu-2.6.10 2.6.10-34.21

Ubuntu 5.10:
linux-image-2.6.12-10-386 2.6.12-10.35
linux-image-2.6.12-10-686 2.6.12-10.35
linux-image-2.6.12-10-686-smp 2.6.12-10.35
linux-image-2.6.12-10-amd64-generic 2.6.12-10.35
linux-image-2.6.12-10-amd64-k8 2.6.12-10.35
linux-image-2.6.12-10-amd64-k8-smp 2.6.12-10.35
linux-image-2.6.12-10-amd64-xeon 2.6.12-10.35
linux-image-2.6.12-10-hppa32 2.6.12-10.35
linux-image-2.6.12-10-hppa32-smp 2.6.12-10.35
linux-image-2.6.12-10-hppa64 2.6.12-10.35
linux-image-2.6.12-10-hppa64-smp 2.6.12-10.35
linux-image-2.6.12-10-iseries-smp 2.6.12-10.35
linux-image-2.6.12-10-itanium 2.6.12-10.35
linux-image-2.6.12-10-itanium-smp 2.6.12-10.35
linux-image-2.6.12-10-k7 2.6.12-10.35
linux-image-2.6.12-10-k7-smp 2.6.12-10.35
linux-image-2.6.12-10-mckinley 2.6.12-10.35
linux-image-2.6.12-10-mckinley-smp 2.6.12-10.35
linux-image-2.6.12-10-powerpc 2.6.12-10.35
linux-image-2.6.12-10-powerpc-smp 2.6.12-10.35
linux-image-2.6.12-10-powerpc64-smp 2.6.12-10.35
linux-image-2.6.12-10-sparc64 2.6.12-10.35
linux-image-2.6.12-10-sparc64-smp 2.6.12-10.35
linux-patch-ubuntu-2.6.12 2.6.12-10.35

Ubuntu 6.06 LTS:
linux-image-2.6.15-26-386 2.6.15-26.44
linux-image-2.6.15-26-686 2.6.15-26.44
linux-image-2.6.15-26-amd64-generic 2.6.15-26.44
linux-image-2.6.15-26-amd64-k8 2.6.15-26.44
linux-image-2.6.15-26-amd64-server 2.6.15-26.44
linux-image-2.6.15-26-amd64-xeon 2.6.15-26.44
linux-image-2.6.15-26-hppa32 2.6.15-26.44
linux-image-2.6.15-26-hppa32-smp 2.6.15-26.44
linux-image-2.6.15-26-hppa64 2.6.15-26.44
linux-image-2.6.15-26-hppa64-smp 2.6.15-26.44
linux-image-2.6.15-26-itanium 2.6.15-26.44
linux-image-2.6.15-26-itanium-smp 2.6.15-26.44
linux-image-2.6.15-26-k7 2.6.15-26.44
linux-image-2.6.15-26-mckinley 2.6.15-26.44
linux-image-2.6.15-26-mckinley-smp 2.6.15-26.44
linux-image-2.6.15-26-powerpc 2.6.15-26.44
linux-image-2.6.15-26-powerpc-smp 2.6.15-26.44
linux-image-2.6.15-26-powerpc64-smp 2.6.15-26.44
linux-image-2.6.15-26-server 2.6.15-26.44
linux-image-2.6.15-26-server-bigiron 2.6.15-26.44
linux-image-2.6.15-26-sparc64 2.6.15-26.44
linux-image-2.6.15-26-sparc64-smp 2.6.15-26.44

After a standard system upgrade you need to reboot your computer to effect the necessary changes.

ATTENTION: Due to an unavoidable ABI change the Ubuntu 6.06 kernel update has been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. If you use linux-restricted-modules, you have to update that package as well to get modules which work with the new kernel version. Unless you manually uninstalled the standard kernel metapackages (linux-386, linux-powerpc, linux-amd64-generic), a standard system upgrade will automatically perform this as well.

Details follow:

A race condition was discovered in the do_add_counters() functions. Processes which do not run with full root privileges, but have the CAP_NET_ADMIN capability can exploit this to crash the machine or read a random piece of kernel memory. In Ubuntu there are no packages that are affected by this, so this can only be an issue for you if you use third-party software that uses Linux capabilities. (CVE-2006-0039)

John Stultz discovered a faulty BUG_ON trigger in the handling of POSIX timers. A local attacker could exploit this to trigger a kernel oops and crash the machine. (CVE-2006-2445)

Dave Jones discovered that the PowerPC kernel did not perform certain required access_ok() checks. A local user could exploit this to read arbitrary kernel memory and crash the kernel on 64-bit systems, and possibly read arbitrary kernel memory on 32-bit systems. (CVE-2006-2448)

A design flaw was discovered in the prctl(PR_SET_DUMPABLE, ...) system call, which allowed a local user to have core dumps created in a directory he could not normally write to. This could be exploited to drain available disk space on system partitions, or, under some circumstances, to execute arbitrary code with full root privileges. This flaw only affects Ubuntu 6.06 LTS. (CVE-2006-2451)

In addition, the Ubuntu 6.06 LTS update fixes a range of bugs.

Original Source

Url : http://www.ubuntu.com/usn/USN-311-1

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-399 Resource Management Errors
50 % CWE-362 Race Condition

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:10040
 
Oval ID: oval:org.mitre.oval:def:10040
Title: Linux kernel before 2.6.16.21 and 2.6.17, when running on PowerPC, does not perform certain required access_ok checks, which allows local users to read arbitrary kernel memory on 64-bit systems (signal_64.c) and cause a denial of service (crash) and possibly read kernel memory on 32-bit systems (signal_32.c).
Description: Linux kernel before 2.6.16.21 and 2.6.17, when running on PowerPC, does not perform certain required access_ok checks, which allows local users to read arbitrary kernel memory on 64-bit systems (signal_64.c) and cause a denial of service (crash) and possibly read kernel memory on 32-bit systems (signal_32.c).
Family: unix Class: vulnerability
Reference(s): CVE-2006-2448
Version: 5
Platform(s): Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:10309
 
Oval ID: oval:org.mitre.oval:def:10309
Title: Race condition in the do_add_counters function in netfilter for Linux kernel 2.6.16 allows local users with CAP_NET_ADMIN capabilities to read kernel memory by triggering the race condition in a way that produces a size value that is inconsistent with allocated memory, which leads to a buffer over-read in IPT_ENTRY_ITERATE.
Description: Race condition in the do_add_counters function in netfilter for Linux kernel 2.6.16 allows local users with CAP_NET_ADMIN capabilities to read kernel memory by triggering the race condition in a way that produces a size value that is inconsistent with allocated memory, which leads to a buffer over-read in IPT_ENTRY_ITERATE.
Family: unix Class: vulnerability
Reference(s): CVE-2006-0039
Version: 5
Platform(s): Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:11336
 
Oval ID: oval:org.mitre.oval:def:11336
Title: The suid_dumpable support in Linux kernel 2.6.13 up to versions before 2.6.17.4, and 2.6.16 before 2.6.16.24, allows a local user to cause a denial of service (disk consumption) and possibly gain privileges via the PR_SET_DUMPABLE argument of the prctl function and a program that causes a core dump file to be created in a directory for which the user does not have permissions.
Description: The suid_dumpable support in Linux kernel 2.6.13 up to versions before 2.6.17.4, and 2.6.16 before 2.6.16.24, allows a local user to cause a denial of service (disk consumption) and possibly gain privileges via the PR_SET_DUMPABLE argument of the prctl function and a program that causes a core dump file to be created in a directory for which the user does not have permissions.
Family: unix Class: vulnerability
Reference(s): CVE-2006-2451
Version: 5
Platform(s): Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 159

ExploitDB Exploits

id Description
2006-07-18 Linux Kernel 2.6.13 <= 2.6.17.4 - prctl() Local Root Exploit (logrotate)
2006-07-13 Linux Kernel 2.6.13 <= 2.6.17.4 - sys_prctl() Local Root Exploit (3)
2006-07-11 Linux Kernel 2.6.13 <= 2.6.17.4 - sys_prctl() Local Root Exploit

OpenVAS Exploits

Date Description
2009-10-10 Name : SLES9: Security update for Linux kernel
File : nvt/sles9p5020521.nasl
2008-01-17 Name : Debian Security Advisory DSA 1097-1 (kernel-source-2.4.27)
File : nvt/deb_1097_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 1103-1 (kernel-source-2.6.8)
File : nvt/deb_1103_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
27030 Linux Kernel prctl Core Dumpe Handling Local Privilege Escalation

Linux Kernel contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when an error occurs during handling of core dumps by the 'prctl' function. This flaw may allow privilege escalation and lead to a loss of Integrity.
26947 Linux Kernel run_posix_cpu_timers Process Timer Local DoS

The Linux kernel contains a flaw that may allow a local denial of service. The issue is triggered because a CPU could attach a timer to a currently exiting process, which will result in a kernel 'oops' and therefore in loss of availability for the platform.
26946 Linux Kernel on PowerPC access_ok Check Failure Arbitrary Kernel Memory Discl...

25697 Linux Kernel Netfilter do_add_counters() Function Local Memory Disclosure

The Linux kernel contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered because of a race condition in the Linux netfilter code. The 'do_add_counters()' function in 'net/ipv4/netfilter/arp_tables.c' and 'net/ipv6/netfilter/arp_tables.c' lacks a check for a parameter that might allow 'IPT_ENTRY_ITERATE()' to read beyond its intended boundaries, potentially accessing sensitive kernel memory and hence resulting in a loss of confidentiality.

Nessus® Vulnerability Scanner

Date Description
2013-07-12 Name : The remote Oracle Linux host is missing a security update.
File : oraclelinux_ELSA-2006-0617.nasl - Type : ACT_GATHER_INFO
2012-05-17 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_kernel-1900.nasl - Type : ACT_GATHER_INFO
2007-12-13 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_kernel-1896.nasl - Type : ACT_GATHER_INFO
2007-11-10 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-311-1.nasl - Type : ACT_GATHER_INFO
2006-12-16 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2006-151.nasl - Type : ACT_GATHER_INFO
2006-10-14 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1097.nasl - Type : ACT_GATHER_INFO
2006-10-14 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1103.nasl - Type : ACT_GATHER_INFO
2006-10-10 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2006-0689.nasl - Type : ACT_GATHER_INFO
2006-10-10 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2006-0689.nasl - Type : ACT_GATHER_INFO
2006-08-30 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2006-0575.nasl - Type : ACT_GATHER_INFO
2006-08-14 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2006-0575.nasl - Type : ACT_GATHER_INFO
2006-07-18 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2006-123.nasl - Type : ACT_GATHER_INFO
2006-07-13 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2006-0574.nasl - Type : ACT_GATHER_INFO
2006-07-10 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2006-0574.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 12:03:35
  • Multiple Updates