Thursday, February 14, 2013

[USN-1726-1] Linux kernel (OMAP4) vulnerabilities

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/
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=qqg7
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1726-1
February 14, 2013

linux-ti-omap4 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 11.10

Summary:

Several security issues were fixed in the kernel.

Software Description:
- linux-ti-omap4: Linux kernel for OMAP4

Details:

It was discovered that hypervkvpd, which is distributed in the Linux
kernel, was not correctly validating the origin on Netlink messages. An
untrusted local user can cause a denial of service of Linux guests in
Hyper-V virtualization environments. (CVE-2012-2669)

Dmitry Monakhov reported a race condition flaw the Linux ext4 filesystem
that can expose stale data. An unprivileged user could exploit this flaw to
cause an information leak. (CVE-2012-4508)

Florian Weimer discovered that hypervkvpd, which is distributed in the
Linux kernel, was not correctly validating source addresses of netlink
packets. An untrusted local user can cause a denial of service by causing
hypervkvpd to exit. (CVE-2012-5532)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 11.10:
linux-image-3.0.0-1221-omap4 3.0.0-1221.34

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References:
http://www.ubuntu.com/usn/usn-1726-1
CVE-2012-2669, CVE-2012-4508, CVE-2012-5532

Package Information:
https://launchpad.net/ubuntu/+source/linux-ti-omap4/3.0.0-1221.34

No comments:

Post a Comment