Saturday, April 26, 2014

[USN-2181-1] Linux kernel (OMAP4) vulnerabilities

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQIcBAEBCgAGBQJTW8AbAAoJEAUvNnAY1cPYApcP/0fiTUJzrF+OzDv9NqMW5oFh
J2iR+sPGZVriTbICj/UIdlUuCBY7TE9cZgbqhJ/BXpUZGkI3K3RHL56V/Xi1hx/Q
igzum5HiB2vqCaSjPsVcdE6CGujepx4RDutqJ1+oRPWgqc39sn6iPBUbhsMRVUsA
halP9aqPBDq3Dz7s7R/iOqFzcWZR36PgItzIJNaZyQRzXuCn4fcjr+6m7MtKhfL4
GJYnU/8wlsJyAtW2BmfiPQZ8Kv6syeFQUOgijbXo5R+jfEXJwN1y0SlmODA38jl0
kQw60Q3WNa5z2Wists3RsBbOmpkagZgfrfCk7wdzeo1TVwHRv2ph2keSh/q9RSvx
blbJrtpTOkPgWGdvFZaXsl++fax91sFFkjDUr7ZjLLLuV8qwdI5ZfxTt0nVqtI1S
gvjgLU7Ue8ZyOb5lsNPGxfYMuAgqS2Q4Ns3ycKei1NzzsocFiYn6FWMbhVdI4MfE
WwfoHdJXHikmGjZlleEnaZAdqNl/kzwxqYoxp3T6Oj5m1I1O+pOJKaRIijL6bzC8
eWLSQR0nxluCEOU96qcR1fGoTXUGrcPmB8OD50Tb0q+EBXYhB7SgU9bxmo/agvWc
1jB42i/4YV7SU2CU3U1fZXqYwk4rSzGoY3AShyH3DSMx6lhPIv9eddVbHL98eruL
H6eu0VyUXOJ78HQ5w8y6
=HpW7
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-2181-1
April 26, 2014

linux-ti-omap4 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 13.10

Summary:

Several security issues were fixed in the kernel.

Software Description:
- linux-ti-omap4: Linux kernel for OMAP4

Details:

A flaw was discovered in the Kernel Virtual Machine (KVM) subsystem of the
Linux kernel. A guest OS user could exploit this flaw to execute arbitrary
code on the host OS. (CVE-2014-0049)

Al Viro discovered an error in how CIFS in the Linux kernel handles
uncached write operations. An unprivileged local user could exploit this
flaw to cause a denial of service (system crash), obtain sensitive
information from kernel memory, or possibly gain privileges.
(CVE-2014-0069)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 13.10:
linux-image-3.5.0-241-omap4 3.5.0-241.57

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References:
http://www.ubuntu.com/usn/usn-2181-1
CVE-2014-0049, CVE-2014-0069

Package Information:
https://launchpad.net/ubuntu/+source/linux-ti-omap4/3.5.0-241.57

No comments:

Post a Comment