USN-1815-1: Linux kernel vulnerabilities

02 May 2013

Several security issues were fixed in the kernel.

Releases

Packages

Details

Andy Lutomirski discover an error in the Linux kernel's credential handling
on unix sockets. A local user could exploit this flaw to gain
administrative privileges. (CVE-2013-1979)

Andy Lutomirski discovered a privilege escalation in the Linux kernel's
user namespaces. A local user could exploit the flaw to gain administrative
privileges. (CVE-2013-1959)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 13.04

After a standard system update you need to reboot your computer to make
all the necessary changes.

Related notices

  • USN-1882-1: linux-ti-omap4, linux-image-3.5.0-226-omap4
  • USN-1883-1: linux-ti-omap4, linux-image-3.5.0-226-omap4
  • USN-1833-1: linux-image-3.2.0-44-highbank, linux-image-3.2.0-44-virtual, linux-image-3.2.0-44-generic, linux, linux-image-3.2.0-44-powerpc64-smp, linux-image-3.2.0-44-powerpc-smp, linux-image-3.2.0-44-omap, linux-image-3.2.0-44-generic-pae
  • USN-1881-1: linux-image-3.5.0-34-generic, linux-image-3.5.0-34-powerpc64-smp, linux-image-3.5.0-34-omap, linux, linux-image-3.5.0-34-highbank, linux-image-3.5.0-34-powerpc-smp
  • USN-1880-1: linux-lts-quantal, linux-image-3.5.0-34-generic
  • USN-1839-1: linux-image-3.2.0-1432-omap4, linux-ti-omap4