Saturday, July 5, 2014

[USN-2268-1] Linux kernel vulnerability

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=US9L
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-2268-1
July 05, 2014

linux vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 LTS

Summary:

The system could be made to crash or run programs as an administrator.

Software Description:
- linux: Linux kernel

Details:

Andy Lutomirski discovered a flaw with the Linux kernel's ptrace syscall on
x86_64 processors. An attacker could exploit this flaw to cause a denial of
service (System Crash) or potential gain administrative privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
linux-image-3.2.0-65-generic 3.2.0-65.99
linux-image-3.2.0-65-generic-pae 3.2.0-65.99
linux-image-3.2.0-65-highbank 3.2.0-65.99
linux-image-3.2.0-65-omap 3.2.0-65.99
linux-image-3.2.0-65-powerpc-smp 3.2.0-65.99
linux-image-3.2.0-65-powerpc64-smp 3.2.0-65.99
linux-image-3.2.0-65-virtual 3.2.0-65.99

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2268-1
CVE-2014-4699

Package Information:
https://launchpad.net/ubuntu/+source/linux/3.2.0-65.99

No comments:

Post a Comment