Friday, June 27, 2014

[USN-2263-1] Linux kernel (OMAP4) vulnerabilities

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=r5ue
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-2263-1
June 27, 2014

linux-ti-omap4 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in the kernel.

Software Description:
- linux-ti-omap4: Linux kernel for OMAP4

Details:

Salva Peiró discovered an information leak in the Linux kernel's media-
device driver. A local attacker could exploit this flaw to obtain sensitive
information from kernel memory. (CVE-2014-1739)

A bounds check error was discovered in the socket filter subsystem of the
Linux kernel. A local user could exploit this flaw to cause a denial of
service (system crash) via crafted BPF instructions. (CVE-2014-3144)

A remainder calculation error was discovered in the socket filter subsystem
of the Linux kernel. A local user could exploit this flaw to cause a denial
of service (system crash) via crafted BPF instructions. (CVE-2014-3145)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
linux-image-3.2.0-1450-omap4 3.2.0-1450.69

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References:
http://www.ubuntu.com/usn/usn-2263-1
CVE-2014-1739, CVE-2014-3144, CVE-2014-3145

Package Information:
https://launchpad.net/ubuntu/+source/linux-ti-omap4/3.2.0-1450.69

No comments:

Post a Comment