Friday, November 30, 2012

[USN-1650-1] Linux kernel vulnerability

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/
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=tBeB
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1650-1
November 30, 2012

linux vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 8.04 LTS

Summary:

The system could be made to crash under certain conditions.

Software Description:
- linux: Linux kernel

Details:

Rodrigo Freire discovered a flaw in the Linux kernel's TCP illinois
congestion control algorithm. A local attacker could use this to cause a
denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 8.04 LTS:
linux-image-2.6.24-32-386 2.6.24-32.106
linux-image-2.6.24-32-generic 2.6.24-32.106
linux-image-2.6.24-32-hppa32 2.6.24-32.106
linux-image-2.6.24-32-hppa64 2.6.24-32.106
linux-image-2.6.24-32-itanium 2.6.24-32.106
linux-image-2.6.24-32-lpia 2.6.24-32.106
linux-image-2.6.24-32-lpiacompat 2.6.24-32.106
linux-image-2.6.24-32-mckinley 2.6.24-32.106
linux-image-2.6.24-32-openvz 2.6.24-32.106
linux-image-2.6.24-32-powerpc 2.6.24-32.106
linux-image-2.6.24-32-powerpc-smp 2.6.24-32.106
linux-image-2.6.24-32-powerpc64-smp 2.6.24-32.106
linux-image-2.6.24-32-rt 2.6.24-32.106
linux-image-2.6.24-32-server 2.6.24-32.106
linux-image-2.6.24-32-sparc64 2.6.24-32.106
linux-image-2.6.24-32-sparc64-smp 2.6.24-32.106
linux-image-2.6.24-32-virtual 2.6.24-32.106
linux-image-2.6.24-32-xen 2.6.24-32.106

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1650-1
CVE-2012-4565

Package Information:
https://launchpad.net/ubuntu/+source/linux/2.6.24-32.106

No comments:

Post a Comment