-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/
iQIcBAEBCgAGBQJQuITxAAoJEAUvNnAY1cPYR3cQAIY05PksGecLmrz6YMihMS3u
1U0kEHKlUENFHgYN0BDmDaeF+sxFQggy2aBJp2HidotsVvOZjgsuTDTS9FzhqiJ0
TNXS8r4cUnCYqBVuBXc3ePxq1MI+icBjFrpQrHg7MwplPqf/79qirQyStf9zqyMl
RPCVfE4Ewa7B4JrXrXAOpe6rZnKsRVrvgRnyb+7P8acYnmdL9yJGLWwdDOsGssmd
SYyYdn53Mr7jIogTSplyvYU2VCjrnum/fidOl0k/GM6dgQqPwsW5KscGJRRGkvHl
UEB53UuYaOorKvoPBnMeTPho4lYu84snC90SjEPAYky+4IinyjzrQw8re90kOAUh
uWZy4l/qA9U56IJuXD0pN9bj//AoJyZeseq+F6pIAvjcKKcaVrISYzsS5k17AWmq
vXQh6WZyFTKgNZgdADC71scSnCkfqE6MfQVtTtxihCXcUnH5+reSea4CVd3LGanY
eoadhaNbG60tZM4qEfrwOyCBeWi9PNzeYSv5R+6X/5oe3m5cLpdOXoIepb/fYV5U
NfW8K/HL21mFObdHHC6MpYF1ll4FATdtzFynv4gcCri1i9n9YeFDv/PU5GdvscTM
F+I3mOQ9AgPd3Z+6mpJTJHVEvei2X4707HZUJWrAYpnEERHai/GUJW81H7nvpCqV
3SgfdSw2P5wxiNx8iVIv
=E6WD
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1651-1
November 30, 2012
linux vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 10.04 LTS
Summary:
The system could be made to crash under certain conditions.
Software Description:
- linux: Linux kernel
Details:
Rodrigo Freire discovered a flaw in the Linux kernel's TCP illinois
congestion control algorithm. A local attacker could use this to cause a
denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 10.04 LTS:
linux-image-2.6.32-45-386 2.6.32-45.100
linux-image-2.6.32-45-generic 2.6.32-45.100
linux-image-2.6.32-45-generic-pae 2.6.32-45.100
linux-image-2.6.32-45-ia64 2.6.32-45.100
linux-image-2.6.32-45-lpia 2.6.32-45.100
linux-image-2.6.32-45-powerpc 2.6.32-45.100
linux-image-2.6.32-45-powerpc-smp 2.6.32-45.100
linux-image-2.6.32-45-powerpc64-smp 2.6.32-45.100
linux-image-2.6.32-45-preempt 2.6.32-45.100
linux-image-2.6.32-45-server 2.6.32-45.100
linux-image-2.6.32-45-sparc64 2.6.32-45.100
linux-image-2.6.32-45-sparc64-smp 2.6.32-45.100
linux-image-2.6.32-45-versatile 2.6.32-45.100
linux-image-2.6.32-45-virtual 2.6.32-45.100
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-1651-1
CVE-2012-4565
Package Information:
https://launchpad.net/ubuntu/+source/linux/2.6.32-45.100
No comments:
Post a Comment