USN-1598-1: Linux kernel vulnerability
9 October 2012
Several security issues were fixed in the kernel.
Releases
Packages
- linux - Linux kernel
Details
An error was discovered in the Linux kernel's network TUN/TAP device
implementation. A local user with access to the TUN/TAP interface (which is
not available to unprivileged users until granted by a root user) could
exploit this flaw to crash the system or potential gain administrative
privileges.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 8.04
-
linux-image-2.6.24-32-itanium
-
2.6.24-32.105
-
linux-image-2.6.24-32-powerpc
-
2.6.24-32.105
-
linux-image-2.6.24-32-powerpc64-smp
-
2.6.24-32.105
-
linux-image-2.6.24-32-sparc64
-
2.6.24-32.105
-
linux-image-2.6.24-32-server
-
2.6.24-32.105
-
linux-image-2.6.24-32-openvz
-
2.6.24-32.105
-
linux-image-2.6.24-32-386
-
2.6.24-32.105
-
linux-image-2.6.24-32-hppa32
-
2.6.24-32.105
-
linux-image-2.6.24-32-lpiacompat
-
2.6.24-32.105
-
linux-image-2.6.24-32-mckinley
-
2.6.24-32.105
-
linux-image-2.6.24-32-lpia
-
2.6.24-32.105
-
linux-image-2.6.24-32-xen
-
2.6.24-32.105
-
linux-image-2.6.24-32-hppa64
-
2.6.24-32.105
-
linux-image-2.6.24-32-powerpc-smp
-
2.6.24-32.105
-
linux-image-2.6.24-32-generic
-
2.6.24-32.105
-
linux-image-2.6.24-32-rt
-
2.6.24-32.105
-
linux-image-2.6.24-32-virtual
-
2.6.24-32.105
-
linux-image-2.6.24-32-sparc64-smp
-
2.6.24-32.105
After a standard system update you need to reboot your computer to make
all the necessary changes.