USN-1683-1: Linux kernel vulnerability
10 January 2013
The system could be made to leak sensitive system information.
Releases
Packages
- linux - Linux kernel
Details
A flaw was discovered in the Linux kernel's handling of script execution
when module loading is enabled. A local attacker could exploit this flaw to
cause a leak of kernel stack contents.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 10.04
-
linux-image-2.6.32-45-generic
-
2.6.32-45.102
-
linux-image-2.6.32-45-powerpc-smp
-
2.6.32-45.102
-
linux-image-2.6.32-45-ia64
-
2.6.32-45.102
-
linux-image-2.6.32-45-lpia
-
2.6.32-45.102
-
linux-image-2.6.32-45-preempt
-
2.6.32-45.102
-
linux-image-2.6.32-45-sparc64-smp
-
2.6.32-45.102
-
linux-image-2.6.32-45-virtual
-
2.6.32-45.102
-
linux-image-2.6.32-45-sparc64
-
2.6.32-45.102
-
linux-image-2.6.32-45-generic-pae
-
2.6.32-45.102
-
linux-image-2.6.32-45-server
-
2.6.32-45.102
-
linux-image-2.6.32-45-powerpc
-
2.6.32-45.102
-
linux-image-2.6.32-45-386
-
2.6.32-45.102
-
linux-image-2.6.32-45-powerpc64-smp
-
2.6.32-45.102
-
linux-image-2.6.32-45-versatile
-
2.6.32-45.102
After a standard system update you need to reboot your computer to make
all the necessary changes.