Summary
Ubuntu Update for Linux kernel vulnerabilities USN-1054-1
Solution
Please Install the Updated Packages.
Insight
Gleb Napatov discovered that KVM did not correctly check certain privileged operations. A local attacker with access to a guest kernel could exploit this to crash the host system, leading to a denial of service. (CVE-2010-0435)
Steve Chen discovered that setsockopt did not correctly check MSS values.
A local attacker could make a specially crafted socket call to crash the system, leading to a denial of service. (CVE-2010-4165)
Dave Jones discovered that the mprotect system call did not correctly handle merged VMAs. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2010-4169)
Vegard Nossum discovered that memory garbage collection was not handled correctly for active sockets. A local attacker could exploit this to allocate all available kernel memory, leading to a denial of service. (CVE-2010-4249)
Affected
linux, linux-ec2 vulnerabilities on Ubuntu 10.04 LTS , Ubuntu 10.10
Severity
Classification
-
CVE CVE-2010-0435, CVE-2010-4165, CVE-2010-4169, CVE-2010-4249 -
CVSS Base Score: 4.9
AV:L/AC:L/Au:N/C:N/I:N/A:C
Related Vulnerabilities