Thursday, February 21, 2013

[USN-1743-1] Linux kernel (Quantal HWE) vulnerability

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/
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=AQkK
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1743-1
February 22, 2013

linux-lts-quantal vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 LTS

Summary:

The system could be made to run programs as an administrator.

Software Description:
- linux-lts-quantal: Linux hardware enablement kernel from Quantal

Details:

Suleiman Souhlal, Salman Qazi, Aaron Durbin and Michael Davidson discovered
a race condition in the Linux kernel's ptrace syscall. An unprivileged
local attacker could exploit this flaw to run programs as an administrator.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
linux-image-3.5.0-25-generic 3.5.0-25.38~precise1

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References:
http://www.ubuntu.com/usn/usn-1743-1
CVE-2013-0871

Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-quantal/3.5.0-25.38~precise1

No comments:

Post a Comment