==========================================================================
Ubuntu Security Notice USN-2660-1
July 07, 2015
linux vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 12.04 LTS
Summary:
The system could be made to expose sensitive information to local
applications.
Software Description:
– linux: Linux kernel
Details:
A race condition was discovered in the Linux kernel’s file_handle size
verification. A local user could exploit this flaw to read potentially
sensative memory locations.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.2.0-87-generic 3.2.0-87.125
linux-image-3.2.0-87-generic-pae 3.2.0-87.125
linux-image-3.2.0-87-highbank 3.2.0-87.125
linux-image-3.2.0-87-omap 3.2.0-87.125
linux-image-3.2.0-87-powerpc-smp 3.2.0-87.125
linux-image-3.2.0-87-powerpc64-smp 3.2.0-87.125
linux-image-3.2.0-87-virtual 3.2.0-87.125
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-2660-1
CVE-2015-1420
Package Information:
https://launchpad.net/ubuntu/+source/linux/3.2.0-87.125
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=0b3f
—–END PGP SIGNATURE—–
—