USN-2036-1: Linux kernel vulnerabilities
3 December 2013
Several security issues were fixed in the kernel.
Releases
Packages
- linux - Linux kernel
Details
A flaw was discovered in the Linux kernel's KVM (kernel virtual machine).
An administrative user in the guest OS could leverage this flaw to cause a
denial of service in the host OS. (CVE-2012-2121)
Multiple integer overflow flaws were discovered in the Alchemy LCD frame-
buffer drivers in the Linux kernel. An unprivileged local user could
exploit this flaw to gain administrative privileges. (CVE-2013-4511)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 10.04
-
linux-image-2.6.32-54-preempt
-
2.6.32-54.116
-
linux-image-2.6.32-54-powerpc-smp
-
2.6.32-54.116
-
linux-image-2.6.32-54-ia64
-
2.6.32-54.116
-
linux-image-2.6.32-54-generic-pae
-
2.6.32-54.116
-
linux-image-2.6.32-54-virtual
-
2.6.32-54.116
-
linux-image-2.6.32-54-lpia
-
2.6.32-54.116
-
linux-image-2.6.32-54-sparc64
-
2.6.32-54.116
-
linux-image-2.6.32-54-386
-
2.6.32-54.116
-
linux-image-2.6.32-54-sparc64-smp
-
2.6.32-54.116
-
linux-image-2.6.32-54-generic
-
2.6.32-54.116
-
linux-image-2.6.32-54-powerpc
-
2.6.32-54.116
-
linux-image-2.6.32-54-powerpc64-smp
-
2.6.32-54.116
-
linux-image-2.6.32-54-server
-
2.6.32-54.116
-
linux-image-2.6.32-54-versatile
-
2.6.32-54.116
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References
Related notices
- USN-1474-1: linux-image-3.2.0-1414-omap4, linux-ti-omap4
- USN-1457-1: linux-image-2.6.38-15-generic-pae, linux, linux-image-2.6.38-15-omap, linux-image-2.6.38-15-versatile, linux-image-2.6.38-15-powerpc-smp, linux-image-2.6.38-15-virtual, linux-image-2.6.38-15-server, linux-image-2.6.38-15-generic, linux-image-2.6.38-15-powerpc, linux-image-2.6.38-15-powerpc64-smp
- USN-1476-1: linux-ti-omap4, linux-image-3.0.0-1211-omap4
- USN-1470-1: linux-image-2.6.38-15-generic-pae, linux-lts-backport-natty, linux-image-2.6.38-15-virtual, linux-image-2.6.38-15-server, linux-image-2.6.38-15-generic
- USN-1472-1: linux-image-3.0.0-21-powerpc64-smp, linux-image-3.0.0-21-generic, linux-image-3.0.0-21-server, linux, linux-image-3.0.0-21-virtual, linux-image-3.0.0-21-powerpc-smp, linux-image-3.0.0-21-generic-pae, linux-image-3.0.0-21-powerpc, linux-image-3.0.0-21-omap
- USN-2037-1: linux-image-2.6.32-359-ec2, linux-ec2
- USN-1473-1: linux-image-3.2.0-25-powerpc-smp, linux, linux-image-3.2.0-25-generic-pae, linux-image-3.2.0-25-powerpc64-smp, linux-image-3.2.0-25-omap, linux-image-3.2.0-25-generic, linux-image-3.2.0-25-virtual, linux-image-3.2.0-25-highbank
- USN-1471-1: linux-image-3.0.0-21-generic, linux-image-3.0.0-21-server, linux-image-3.0.0-21-virtual, linux-image-3.0.0-21-generic-pae, linux-lts-backport-oneiric
- USN-1577-1: linux-image-2.6.38-1209-omap4, linux-ti-omap4
- USN-2071-1: linux, linux-image-3.5.0-45-powerpc64-smp, linux-image-3.5.0-45-powerpc-smp, linux-image-3.5.0-45-omap, linux-image-3.5.0-45-generic, linux-image-3.5.0-45-highbank
- USN-2075-1: linux, linux-image-3.11.0-15-generic, linux-image-3.11.0-15-generic-lpae
- USN-2067-1: linux-image-3.2.0-1442-omap4, linux-ti-omap4
- USN-2074-1: linux-image-3.5.0-237-omap4, linux-ti-omap4
- USN-2069-1: linux-image-3.8.0-35-generic, linux-lts-raring
- USN-2076-1: linux-image-3.5.0-237-omap4, linux-ti-omap4
- USN-2073-1: linux-image-3.8.0-35-generic, linux
- USN-2068-1: linux-image-3.5.0-45-generic, linux-lts-quantal
- USN-2066-1: linux-image-3.2.0-58-powerpc-smp, linux, linux-image-3.2.0-58-generic-pae, linux-image-3.2.0-58-highbank, linux-image-3.2.0-58-virtual, linux-image-3.2.0-58-powerpc64-smp, linux-image-3.2.0-58-omap, linux-image-3.2.0-58-generic
- USN-2070-1: linux-lts-saucy, linux-image-3.11.0-15-generic, linux-image-3.11.0-15-generic-lpae
- USN-2072-1: linux-image-3.5.0-237-omap4, linux-ti-omap4