USN-2196-1: Linux kernel vulnerability
6 May 2014
The system could be made to crash or run programs as an administrator.
Releases
Packages
- linux - Linux kernel
Details
A flaw was discovered in the Linux kernel's pseudo tty (pty) device. An
unprivileged user could exploit this flaw to cause a denial of service
(system crash) or potentially gain administrator privileges.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 10.04
-
linux-image-2.6.32-58-386
-
2.6.32-58.121
-
linux-image-2.6.32-58-lpia
-
2.6.32-58.121
-
linux-image-2.6.32-58-ia64
-
2.6.32-58.121
-
linux-image-2.6.32-58-versatile
-
2.6.32-58.121
-
linux-image-2.6.32-58-server
-
2.6.32-58.121
-
linux-image-2.6.32-58-powerpc64-smp
-
2.6.32-58.121
-
linux-image-2.6.32-58-generic-pae
-
2.6.32-58.121
-
linux-image-2.6.32-58-powerpc-smp
-
2.6.32-58.121
-
linux-image-2.6.32-58-generic
-
2.6.32-58.121
-
linux-image-2.6.32-58-virtual
-
2.6.32-58.121
-
linux-image-2.6.32-58-sparc64-smp
-
2.6.32-58.121
-
linux-image-2.6.32-58-powerpc
-
2.6.32-58.121
-
linux-image-2.6.32-58-preempt
-
2.6.32-58.121
-
linux-image-2.6.32-58-sparc64
-
2.6.32-58.121
After a standard system update you need to reboot your computer to make
all the necessary changes.