Friday, November 30, 2012

[USN-1646-1] Linux kernel vulnerabilities

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/
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=rpbC
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1646-1
November 30, 2012

linux vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.10

Summary:

Several security issues were fixed in the kernel.

Software Description:
- linux: Linux kernel

Details:

Brad Spengler discovered a flaw in the Linux kernel's uname system call. An
unprivileged user could exploit this flaw to read kernel stack memory.
(CVE-2012-0957)

Rodrigo Freire discovered a flaw in the Linux kernel's TCP illinois
congestion control algorithm. A local attacker could use this to cause a
denial of service. (CVE-2012-4565)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.10:
linux-image-3.5.0-19-generic 3.5.0-19.30
linux-image-3.5.0-19-highbank 3.5.0-19.30
linux-image-3.5.0-19-omap 3.5.0-19.30
linux-image-3.5.0-19-powerpc-smp 3.5.0-19.30
linux-image-3.5.0-19-powerpc64-smp 3.5.0-19.30

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1646-1
CVE-2012-0957, CVE-2012-4565

Package Information:
https://launchpad.net/ubuntu/+source/linux/3.5.0-19.30

No comments:

Post a Comment