Monday, May 5, 2014

[USN-2204-1] Linux kernel vulnerability

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=2hsB
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-2204-1
May 06, 2014

linux vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 LTS

Summary:

The system could be made to crash or run programs as an administrator.

Software Description:
- linux: Linux kernel

Details:

A flaw was discovered in the Linux kernel's pseudo tty (pty) device. An
unprivileged user could exploit this flaw to cause a denial of service
(system crash) or potentially gain administrator privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
linux-image-3.13.0-24-generic 3.13.0-24.47
linux-image-3.13.0-24-generic-lpae 3.13.0-24.47
linux-image-3.13.0-24-lowlatency 3.13.0-24.47
linux-image-3.13.0-24-powerpc-e500 3.13.0-24.47
linux-image-3.13.0-24-powerpc-e500mc 3.13.0-24.47
linux-image-3.13.0-24-powerpc-smp 3.13.0-24.47
linux-image-3.13.0-24-powerpc64-emb 3.13.0-24.47
linux-image-3.13.0-24-powerpc64-smp 3.13.0-24.47

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2204-1
CVE-2014-0196

Package Information:
https://launchpad.net/ubuntu/+source/linux/3.13.0-24.47

No comments:

Post a Comment