-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/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=m8vz
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1751-1
February 27, 2013
linux-ti-omap4 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.10
Summary:
The system could be made to crash or run programs as an administrator.
Software Description:
- linux-ti-omap4: Linux kernel for OMAP4
Details:
Mathias Krause discovered a bounds checking error for netlink messages
requesting SOCK_DIAG_BY_FAMILY. An unprivileged local user could exploit
this flaw to crash the system or run programs as an administrator.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.10:
linux-image-3.5.0-220-omap4 3.5.0-220.29
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1751-1
CVE-2013-1763
Package Information:
https://launchpad.net/ubuntu/+source/linux-ti-omap4/3.5.0-220.29
No comments:
Post a Comment