USN-2266-1: Linux kernel vulnerability
5 July 2014
The system could be made to crash or run programs as an administrator.
Releases
Packages
- linux - Linux kernel
Details
Andy Lutomirski discovered a flaw with the Linux kernel's ptrace syscall on
x86_64 processors. An attacker could exploit this flaw to cause a denial of
service (System Crash) or potential gain administrative privileges.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 10.04
-
linux-image-2.6.32-62-powerpc-smp
-
2.6.32-62.126
-
linux-image-2.6.32-62-versatile
-
2.6.32-62.126
-
linux-image-2.6.32-62-server
-
2.6.32-62.126
-
linux-image-2.6.32-62-powerpc64-smp
-
2.6.32-62.126
-
linux-image-2.6.32-62-lpia
-
2.6.32-62.126
-
linux-image-2.6.32-62-386
-
2.6.32-62.126
-
linux-image-2.6.32-62-generic-pae
-
2.6.32-62.126
-
linux-image-2.6.32-62-sparc64-smp
-
2.6.32-62.126
-
linux-image-2.6.32-62-preempt
-
2.6.32-62.126
-
linux-image-2.6.32-62-sparc64
-
2.6.32-62.126
-
linux-image-2.6.32-62-virtual
-
2.6.32-62.126
-
linux-image-2.6.32-62-ia64
-
2.6.32-62.126
-
linux-image-2.6.32-62-generic
-
2.6.32-62.126
-
linux-image-2.6.32-62-powerpc
-
2.6.32-62.126
After a standard system update you need to reboot your computer to make
all the necessary changes.