|
|
Subscribe / Log in / New account

Ubuntu alert USN-2527-1 (linux-lts-trusty)

From:  John Johansen <john.johansen@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-2527-1] Linux kernel (Trusty HWE) vulnerability
Date:  Wed, 11 Mar 2015 23:47:50 -0700
Message-ID:  <55013696.5070803@canonical.com>

========================================================================== Ubuntu Security Notice USN-2527-1 March 12, 2015 linux-lts-trusty vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 LTS Summary: The system could be made to crash or run programs as an administrator. Software Description: - linux-lts-trusty: Linux hardware enablement kernel from Trusty Details: It was discovered that the Linux kernel's Infiniband subsystem did not properly sanitize its input parameters while registering memory regions from userspace. A local user could exploit this flaw to cause a denial of service (system crash) or to potentially gain administrative privileges. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 LTS: linux-image-3.13.0-46-generic 3.13.0-46.79~precise1 linux-image-3.13.0-46-generic-lpae 3.13.0-46.79~precise1 After a standard system update you need to reboot your computer to make all the necessary changes. References: http://www.ubuntu.com/usn/usn-2527-1 CVE-2014-8159 Package Information: https://launchpad.net/ubuntu/+source/linux-lts-trusty/3.1... -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds