~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
PublicDateAtUSN: 2010-02-17
Candidate: CVE-2010-0307
PublicDate: 2010-02-17
References: 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0307
 http://marc.info/?t=126466700200002&r=1&w=2
 https://bugzilla.redhat.com/show_bug.cgi?id=560547
 http://www.ubuntu.com/usn/usn-914-1
Description:
 The load_elf_binary function in fs/binfmt_elf.c in the Linux kernel before
 2.6.32.8 on the x86_64 platform does not ensure that the ELF interpreter is
 available before a call to the SET_PERSONALITY macro, which allows local
 users to cause a denial of service (system crash) via a 32-bit application
 that attempts to execute a 64-bit application and then triggers a
 segmentation fault, as demonstrated by amd64_killer, related to the
 flush_old_exec function.
Ubuntu-Description: 
 Mathias Krause discovered that the Linux kernel did not correctly handle
 missing ELF interpreters.  A local attacker could exploit this to cause
 the system to crash, leading to a denial of service.
Notes: 
 jdstrand> commits based on comments from dann frazier <dannf@dannf.org> in
  oss-security
Bugs: 
Priority: low
Discovered-by: Mathias Krause
Assigned-to: 

Patches_linux-source-2.6.15:
upstream_linux-source-2.6.15: released (2.6.33~rc6)
dapper_linux-source-2.6.15: released (2.6.15-55.83)
hardy_linux-source-2.6.15: DNE
intrepid_linux-source-2.6.15: DNE
jaunty_linux-source-2.6.15: DNE
karmic_linux-source-2.6.15: DNE
devel_linux-source-2.6.15: DNE

Patches_linux:
 upstream: http://git.kernel.org/linus/221af7f87b97431e3ee21ce4b0e77d5411cf1549
 upstream: http://git.kernel.org/linus/7ab02af428c2d312c0cf8fb0b01cc1eb21131a3d
 upstream: http://git.kernel.org/linus/05d43ed8a89c159ff641d472f970e3f1baa66318
 upstream: http://git.kernel.org/linus/94f28da8409c6059135e89ac64a0839993124155
 upstream: http://git.kernel.org/linus/94673e968cbcce07fa78dac4b0ae05d24b5816e1
upstream_linux: released (2.6.33~rc6)
dapper_linux: DNE
hardy_linux: released (2.6.24-27.68)
intrepid_linux: released (2.6.27-17.46)
jaunty_linux: released (2.6.28-18.60)
karmic_linux: released (2.6.31-20.58)
devel_linux: not-affected