-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/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=e6uY
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1728-1
February 19, 2013
linux-ec2 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 10.04 LTS
Summary:
The system could be made to crash under certain conditions.
Software Description:
- linux-ec2: Linux kernel for EC2
Details:
Andrew Cooper of Citrix reported a Xen stack corruption in the Linux
kernel. An unprivileged user in a 32bit PVOPS guest can cause the guest
kernel to crash, or operate erroneously.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 10.04 LTS:
linux-image-2.6.32-350-ec2 2.6.32-350.60
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1728-1
CVE-2013-0190
Package Information:
https://launchpad.net/ubuntu/+source/linux-ec2/2.6.32-350.60
No comments:
Post a Comment