==========================================================================
Ubuntu Security Notice USN-2285-1
July 17, 2014
linux-lts-quantal vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
– linux-lts-quantal: Linux hardware enablement kernel from Quantal
Details:
Sasha Levin reported a flaw in the Linux kernel’s point-to-point protocol
(PPP) when used with the Layer Two Tunneling Protocol (L2TP). A local user
could exploit this flaw to gain administrative privileges. (CVE-2014-4943)
Michael S. Tsirkin discovered an information leak in the Linux kernel’s
segmentation of skbs when using the zerocopy feature of vhost-net. A local
attacker could exploit this flaw to gain potentially sensitive information
from kernel memory. (CVE-2014-0131)
Salva Peiró discovered an information leak in the Linux kernel’s media-
device driver. A local attacker could exploit this flaw to obtain sensitive
information from kernel memory. (CVE-2014-1739)
A flaw was discovered in the Linux kernel’s audit subsystem when auditing
certain syscalls. A local attacker could exploit this flaw to obtain
potentially sensitive single-bit values from kernel memory or cause a
denial of service (OOPS). (CVE-2014-3917)
A flaw was discovered in the Linux kernel’s implementation of user
namespaces with respect to inode permissions. A local user could exploit
this flaw by creating a user namespace to gain administrative privileges.
(CVE-2014-4014)
An information leak was discovered in the rd_mcp backend of the iSCSI
target subsystem in the Linux kernel. A local user could exploit this flaw
to obtain sensitive information from ramdisk_mcp memory by leveraging
access to a SCSI initiator. (CVE-2014-4027)
Don Bailey discovered a flaw in the LZO decompress algorithm used by the
Linux kernel. An attacker could exploit this flaw to cause a denial of
service (memory corruption or OOPS). (CVE-2014-4608)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.5.0-54-generic 3.5.0-54.81~precise1
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-2285-1
CVE-2014-0131, CVE-2014-1739, CVE-2014-3917, CVE-2014-4014,
CVE-2014-4027, CVE-2014-4608, CVE-2014-4943
Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-quantal/3.5.0-54.81~precise1
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=9AMY
—–END PGP SIGNATURE—–
—