Your submission was sent successfully! Close

You have successfully unsubscribed! Close

USN-1725-1: Linux kernel vulnerability

14 February 2013

The system could be made to crash under certain conditions.

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.

Learn more about Ubuntu Pro

Releases

Packages

Details

Andrew Cooper of Citrix reported a Xen stack corruption in the Linux
kernel. An unprivileged user in a 32bit PVOPS guest can cause the guest
kernel to crash, or operate erroneously.

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.

Learn more about Ubuntu Pro

References

Related notices

  • USN-1767-1: linux-image-3.2.0-39-powerpc-smp, linux, linux-image-3.2.0-39-generic-pae, linux-image-3.2.0-39-powerpc64-smp, linux-image-3.2.0-39-virtual, linux-image-3.2.0-39-highbank, linux-image-3.2.0-39-omap, linux-image-3.2.0-39-generic
  • USN-1719-1: linux-image-3.0.0-31-generic-pae, linux-lts-backport-oneiric, linux-image-3.0.0-31-generic, linux-image-3.0.0-31-virtual, linux-image-3.0.0-31-server
  • USN-1769-1: linux-image-3.5.0-26-powerpc-smp, linux-image-3.5.0-26-powerpc64-smp, linux-image-3.5.0-26-omap, linux-image-3.5.0-26-highbank, linux-image-3.5.0-26-generic, linux
  • USN-1728-1: linux-image-2.6.32-350-ec2, linux-ec2
  • USN-1774-1: linux-ti-omap4, linux-image-3.5.0-221-omap4
  • USN-1768-1: linux-lts-quantal, linux-image-3.5.0-26-generic
  • USN-1720-1: linux-image-3.0.0-31-powerpc64-smp, linux-image-3.0.0-31-powerpc, linux-image-3.0.0-31-generic-pae, linux-image-3.0.0-31-generic, linux-image-3.0.0-31-omap, linux-image-3.0.0-31-virtual, linux-image-3.0.0-31-powerpc-smp, linux-image-3.0.0-31-server, linux