USN-1594-1: Linux kernel (Oneiric backport) vulnerabilities
3 October 2012
Several security issues were fixed in the kernel.
Releases
Packages
- linux-lts-backport-oneiric - Linux kernel backport from Oneiric
Details
Vadim Ponomarev discovered a flaw in the Linux kernel causing a reference
leak when PID namespaces are used. A remote attacker could exploit this
flaw causing a denial of service. (CVE-2012-2127)
A flaw was found in how the Linux kernel's KVM (Kernel-based Virtual
Machine) subsystem handled MSI (Message Signaled Interrupts). A local
unprivileged user could exploit this flaw to cause a denial of service or
potentially elevate privileges. (CVE-2012-2137)
Mathias Krause discover an error in Linux kernel's Datagram Congestion
Control Protocol (DCCP) Congestion Control Identifier (CCID) use. A local
attack could exploit this flaw to cause a denial of service (crash) and
potentially escalate privileges if the user can mmap page 0.
(CVE-2013-1827)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 10.04
-
linux-image-3.0.0-26-server
-
3.0.0-26.43~lucid1
-
linux-image-3.0.0-26-generic
-
3.0.0-26.43~lucid1
-
linux-image-3.0.0-26-virtual
-
3.0.0-26.43~lucid1
-
linux-image-3.0.0-26-generic-pae
-
3.0.0-26.43~lucid1
After a standard system update you need to reboot your computer to make
all the necessary changes.
References
Related notices
- USN-1607-1: linux-image-3.0.0-26-generic-pae, linux-image-3.0.0-26-server, linux-image-3.0.0-26-powerpc, linux-image-3.0.0-26-powerpc-smp, linux-image-3.0.0-26-omap, linux-image-3.0.0-26-powerpc64-smp, linux-image-3.0.0-26-generic, linux, linux-image-3.0.0-26-virtual
- USN-1606-1: linux-image-2.6.32-44-sparc64, linux-image-2.6.32-44-powerpc64-smp, linux-image-2.6.32-44-sparc64-smp, linux-image-2.6.32-44-386, linux-image-2.6.32-44-powerpc-smp, linux-image-2.6.32-44-lpia, linux-image-2.6.32-44-server, linux-image-2.6.32-44-ia64, linux-image-2.6.32-44-powerpc, linux, linux-image-2.6.32-44-generic, linux-image-2.6.32-44-virtual, linux-image-2.6.32-44-generic-pae, linux-image-2.6.32-44-versatile, linux-image-2.6.32-44-preempt
- USN-1529-1: linux-image-3.2.0-29-generic, linux-image-3.2.0-29-powerpc64-smp, linux-image-3.2.0-29-virtual, linux-image-3.2.0-29-omap, linux, linux-image-3.2.0-29-generic-pae, linux-image-3.2.0-29-powerpc-smp, linux-image-3.2.0-29-highbank
- USN-1514-1: linux-ti-omap4, linux-image-3.2.0-1417-omap4
- USN-1609-1: linux-ti-omap4, linux-image-3.0.0-1216-omap4
- USN-1653-1: linux-image-2.6.32-350-ec2, linux-ec2
- USN-1651-1: linux-image-2.6.32-45-ia64, linux-image-2.6.32-45-preempt, linux-image-2.6.32-45-powerpc64-smp, linux-image-2.6.32-45-lpia, linux-image-2.6.32-45-sparc64-smp, linux-image-2.6.32-45-versatile, linux-image-2.6.32-45-generic, linux, linux-image-2.6.32-45-sparc64, linux-image-2.6.32-45-386, linux-image-2.6.32-45-powerpc-smp, linux-image-2.6.32-45-virtual, linux-image-2.6.32-45-generic-pae, linux-image-2.6.32-45-powerpc, linux-image-2.6.32-45-server
- USN-1599-1: linux-ti-omap4, linux-image-3.2.0-1420-omap4
- USN-1610-1: linux-image-3.2.0-32-powerpc64-smp, linux-image-3.2.0-32-virtual, linux-image-3.2.0-32-omap, linux, linux-image-3.2.0-32-powerpc-smp, linux-image-3.2.0-32-generic, linux-image-3.2.0-32-highbank, linux-image-3.2.0-32-generic-pae