USN-2266-1: Linux kernel vulnerability

05 July 2014

The system could be made to crash or run programs as an administrator.

Releases

Packages

Details

Andy Lutomirski discovered a flaw with the Linux kernel's ptrace syscall on
x86_64 processors. An attacker could exploit this flaw to cause a denial of
service (System Crash) or potential gain administrative privileges.

References

Related notices

  • USN-2267-1: linux-image-2.6.32-366-ec2, linux-ec2
  • USN-2284-1: linux-image-3.2.0-1451-omap4, linux-ti-omap4
  • USN-2272-1: linux-lts-trusty, linux-image-3.13.0-30-generic-lpae, linux-image-3.13.0-30-generic
  • USN-2269-1: linux-image-3.5.0-52-generic, linux-lts-quantal
  • USN-2271-1: linux-image-3.11.0-24-generic-lpae, linux-lts-saucy, linux-image-3.11.0-24-generic
  • USN-2270-1: linux-image-3.8.0-42-generic, linux-lts-raring
  • USN-2268-1: linux-image-3.2.0-65-generic-pae, linux-image-3.2.0-65-powerpc64-smp, linux-image-3.2.0-65-powerpc-smp, linux-image-3.2.0-65-virtual, linux-image-3.2.0-65-generic, linux, linux-image-3.2.0-65-omap, linux-image-3.2.0-65-highbank
  • USN-2273-1: linux-image-3.11.0-24-generic-lpae, linux-image-3.11.0-24-generic, linux
  • USN-2274-1: linux-image-3.13.0-30-powerpc-e500mc, linux-image-3.13.0-30-powerpc64-emb, linux-image-3.13.0-30-powerpc64-smp, linux-image-3.13.0-30-powerpc-smp, linux-image-3.13.0-30-lowlatency, linux-image-3.13.0-30-powerpc-e500, linux-image-3.13.0-30-generic, linux, linux-image-3.13.0-30-generic-lpae