-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/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=jCQu
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-2041-1
December 03, 2013
linux-lts-raring vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux-lts-raring: Linux hardware enablement kernel from Raring
Details:
A flaw was discovered in the Linux kernel's dm snapshot facility. A remote
authenticated user could exploit this flaw to obtain sensitive information
or modify/corrupt data. (CVE-2013-4299)
Alan Chester reported a flaw in the IPv6 Stream Control Transmission
Protocol (SCTP) of the Linux kernel. A remote attacker could exploit this
flaw to obtain sensitive information by sniffing network traffic.
(CVE-2013-4350)
Dmitry Vyukov reported a flaw in the Linux kernel's handling of IPv6 UDP
Fragmentation Offload (UFO) processing. A remote attacker could leverage
this flaw to cause a denial of service (system crash). (CVE-2013-4387)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.8.0-34-generic 3.8.0-34.49~precise1
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-2041-1
CVE-2013-4299, CVE-2013-4350, CVE-2013-4387
Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-raring/3.8.0-34.49~precise1
No comments:
Post a Comment