-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/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=r5ue
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-2263-1
June 27, 2014
linux-ti-omap4 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux-ti-omap4: Linux kernel for OMAP4
Details:
Salva Peiró discovered an information leak in the Linux kernel's media-
device driver. A local attacker could exploit this flaw to obtain sensitive
information from kernel memory. (CVE-2014-1739)
A bounds check error was discovered in the socket filter subsystem of the
Linux kernel. A local user could exploit this flaw to cause a denial of
service (system crash) via crafted BPF instructions. (CVE-2014-3144)
A remainder calculation error was discovered in the socket filter subsystem
of the Linux kernel. A local user could exploit this flaw to cause a denial
of service (system crash) via crafted BPF instructions. (CVE-2014-3145)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.2.0-1450-omap4 3.2.0-1450.69
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-2263-1
CVE-2014-1739, CVE-2014-3144, CVE-2014-3145
Package Information:
https://launchpad.net/ubuntu/+source/linux-ti-omap4/3.2.0-1450.69
No comments:
Post a Comment