Ubuntu alert USN-5588-1 (kernel)
| From: | Rodrigo Figueiredo Zaiden <rodrigo.zaiden@canonical.com> | |
| To: | ubuntu-security-announce@lists.ubuntu.com | |
| Subject: | [USN-5588-1] Linux kernel vulnerability | |
| Date: | Tue, 30 Aug 2022 11:25:35 -0300 | |
| Message-ID: | <7fc72e99-df7e-f7a8-529e-ad2c4eed7ed5@canonical.com> |
========================================================================== Ubuntu Security Notice USN-5588-1 August 30, 2022 linux vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 ESM Summary: The system could be made to crash or run programs as an administrator. Software Description: - linux: Linux kernel Details: Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 ESM: linux-image-3.13.0-191-generic 3.13.0-191.242 linux-image-3.13.0-191-lowlatency 3.13.0-191.242 linux-image-generic 3.13.0.191.201 linux-image-lowlatency 3.13.0.191.201 linux-image-server 3.13.0.191.201 linux-image-virtual 3.13.0.191.201 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5588-1 CVE-2022-2588
