USN-1468-1: Linux kernel vulnerability
12 June 2012
The system could be made to crash or run programs as an administrator.
Releases
Packages
- linux - Linux kernel
Details
Schacher Raindel discovered a flaw in the Linux kernel's memory handling
when hugetlb is enabled. An unprivileged local attacker could exploit this
flaw to cause a denial of service and potentially gain higher privileges.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 10.04
-
linux-image-2.6.32-41-server
-
2.6.32-41.90
-
linux-image-2.6.32-41-preempt
-
2.6.32-41.90
-
linux-image-2.6.32-41-ia64
-
2.6.32-41.90
-
linux-image-2.6.32-41-generic-pae
-
2.6.32-41.90
-
linux-image-2.6.32-41-386
-
2.6.32-41.90
-
linux-image-2.6.32-41-generic
-
2.6.32-41.90
-
linux-image-2.6.32-41-powerpc
-
2.6.32-41.90
-
linux-image-2.6.32-41-sparc64
-
2.6.32-41.90
-
linux-image-2.6.32-41-sparc64-smp
-
2.6.32-41.90
-
linux-image-2.6.32-41-powerpc-smp
-
2.6.32-41.90
-
linux-image-2.6.32-41-virtual
-
2.6.32-41.90
-
linux-image-2.6.32-41-powerpc64-smp
-
2.6.32-41.90
-
linux-image-2.6.32-41-versatile
-
2.6.32-41.90
-
linux-image-2.6.32-41-lpia
-
2.6.32-41.90
After a standard system update you need to reboot your computer to make
all the necessary changes.