Thursday, June 5, 2014

[USN-2238-1] Linux kernel (Raring HWE) vulnerabilities

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQIcBAEBCgAGBQJTkP/eAAoJEAUvNnAY1cPYIhQP/2etjj/lZbpXZ56JSK1YEb3G
g0lQyoV9AMsvrzRjPCdGWBSq8P/J+VCmo3o+gMnT6Uij3uNxWbl6skBVRgOPsXtZ
LDtBFNaJhkDig6IYRUH/LRWykfkimnfeV0uHmpUWnwCbDxAGSPJLSrINTTgY+6Mo
XdB/XxDOlHW1BQF0em+WhBm7vbwEKFMvINh36Hxc/2tsonz9sMCRIuDZLojTSqPg
+yPNU93eXz/mIoYdtYvKdK1vX/loLkQGSWwzuZxM22C/phfJVgKsDvGFHy3z6uLG
UiAWgV5WR4g9VnhDrruVz0o+H/vcjnARuupBeTxB0P4TQPHjIbtqFAaLhuFlEzrE
IlEU2c1qr1SXREWerUzDoNRtFBLte98nhKugyu5TuUL9/FPEv0OSINK6wMQDZY/R
xCDNFTBikGiWlmYx4o0hk23Gqu8CamesmDANaH9fE+q/jD+zqMWGpE4wG1Ac8y+k
aN27AxZaG5S5EY5YqxR4LFQBCaal3o7+hLXHeR2KZrGOkzoNmx7KOvpid3UuukoB
Qa9gngk6Vci8jX2mG3eHq0jG8z0493LDsnU7pkzfZB0Y9Gw83Vz+S+m87MdpQF4T
3xN4dww32VEGbRNQ0WVJPxpI9tzicVuDQxXnSQHqzZwjW/+qSI6MgG3bWOXQvEa4
ZobW8qOf3Z10YXlKNo+u
=YUdQ
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-2238-1
June 05, 2014

linux-lts-raring vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in the kernel.

Software Description:
- linux-lts-raring: Linux hardware enablement kernel from Raring

Details:

Pinkie Pie discovered a flaw in the Linux kernel's futex subsystem. An
unprivileged local user could exploit this flaw to cause a denial of
service (system crash) or gain administrative privileges. (CVE-2014-3153)

A flaw was discovered in the Linux kernel's IPC reference counting. An
unprivileged local user could exploit this flaw to cause a denial of
service (OOM system crash). (CVE-2013-4483)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
linux-image-3.8.0-42-generic 3.8.0-42.62~precise1

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References:
http://www.ubuntu.com/usn/usn-2238-1
CVE-2013-4483, CVE-2014-3153

Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-raring/3.8.0-42.62~precise1

No comments:

Post a Comment