-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/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=RZcU
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1744-1
February 22, 2013
linux vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.10
Summary:
The system could be made to run programs as an administrator.
Software Description:
- linux: Linux kernel
Details:
Suleiman Souhlal, Salman Qazi, Aaron Durbin and Michael Davidson discovered
a race condition in the Linux kernel's ptrace syscall. An unprivileged
local attacker could exploit this flaw to run programs as an administrator.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.10:
linux-image-3.5.0-25-generic 3.5.0-25.38
linux-image-3.5.0-25-highbank 3.5.0-25.38
linux-image-3.5.0-25-omap 3.5.0-25.38
linux-image-3.5.0-25-powerpc-smp 3.5.0-25.38
linux-image-3.5.0-25-powerpc64-smp 3.5.0-25.38
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-1744-1
CVE-2013-0871
Package Information:
https://launchpad.net/ubuntu/+source/linux/3.5.0-25.38
No comments:
Post a Comment