USN-2268-1: Linux kernel vulnerability

05 July 2014

The system could be made to crash or run programs as an administrator.

Releases

Packages

  • linux - Linux kernel

Details

Andy Lutomirski discovered a flaw with the Linux kernel's ptrace syscall on
x86_64 processors. An attacker could exploit this flaw to cause a denial of
service (System Crash) or potential gain administrative privileges.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 12.04

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

Related notices

  • USN-2267-1: linux-ec2, linux-image-2.6.32-366-ec2
  • USN-2284-1: linux-ti-omap4, linux-image-3.2.0-1451-omap4
  • USN-2272-1: linux-image-3.13.0-30-generic, linux-lts-trusty, linux-image-3.13.0-30-generic-lpae
  • USN-2269-1: linux-lts-quantal, linux-image-3.5.0-52-generic
  • USN-2271-1: linux-lts-saucy, linux-image-3.11.0-24-generic-lpae, linux-image-3.11.0-24-generic
  • USN-2270-1: linux-image-3.8.0-42-generic, linux-lts-raring
  • USN-2273-1: linux, linux-image-3.11.0-24-generic-lpae, linux-image-3.11.0-24-generic
  • USN-2274-1: linux-image-3.13.0-30-powerpc-smp, linux-image-3.13.0-30-generic, linux-image-3.13.0-30-powerpc64-smp, linux-image-3.13.0-30-powerpc-e500, linux-image-3.13.0-30-lowlatency, linux, linux-image-3.13.0-30-powerpc-e500mc, linux-image-3.13.0-30-generic-lpae, linux-image-3.13.0-30-powerpc64-emb
  • USN-2266-1: linux-image-2.6.32-62-powerpc64-smp, linux-image-2.6.32-62-preempt, linux-image-2.6.32-62-versatile, linux-image-2.6.32-62-sparc64-smp, linux-image-2.6.32-62-server, linux-image-2.6.32-62-386, linux-image-2.6.32-62-ia64, linux, linux-image-2.6.32-62-generic, linux-image-2.6.32-62-sparc64, linux-image-2.6.32-62-generic-pae, linux-image-2.6.32-62-powerpc-smp, linux-image-2.6.32-62-virtual, linux-image-2.6.32-62-powerpc, linux-image-2.6.32-62-lpia