USN-1725-1: Linux kernel vulnerability

14 February 2013

The system could be made to crash under certain conditions.

Releases

Packages

Details

Andrew Cooper of Citrix reported a Xen stack corruption in the Linux
kernel. An unprivileged user in a 32bit PVOPS guest can cause the guest
kernel to crash, or operate erroneously.

References

Related notices

  • USN-1719-1: linux-image-3.0.0-31-server, linux-image-3.0.0-31-virtual, linux-image-3.0.0-31-generic, linux-image-3.0.0-31-generic-pae, linux-lts-backport-oneiric
  • USN-1720-1: linux-image-3.0.0-31-server, linux-image-3.0.0-31-powerpc-smp, linux-image-3.0.0-31-omap, linux-image-3.0.0-31-virtual, linux-image-3.0.0-31-generic, linux-image-3.0.0-31-generic-pae, linux-image-3.0.0-31-powerpc, linux-image-3.0.0-31-powerpc64-smp, linux
  • USN-1728-1: linux-ec2, linux-image-2.6.32-350-ec2
  • USN-1767-1: linux-image-3.2.0-39-omap, linux-image-3.2.0-39-generic, linux-image-3.2.0-39-generic-pae, linux-image-3.2.0-39-powerpc64-smp, linux-image-3.2.0-39-virtual, linux-image-3.2.0-39-powerpc-smp, linux-image-3.2.0-39-highbank, linux
  • USN-1768-1: linux-image-3.5.0-26-generic, linux-lts-quantal
  • USN-1769-1: linux-image-3.5.0-26-powerpc-smp, linux-image-3.5.0-26-omap, linux-image-3.5.0-26-generic, linux-image-3.5.0-26-powerpc64-smp, linux, linux-image-3.5.0-26-highbank
  • USN-1774-1: linux-ti-omap4, linux-image-3.5.0-221-omap4