USN-1725-1: Linux kernel vulnerability
14 February 2013
The system could be made to crash under certain conditions.
Releases
Packages
- linux - Linux kernel
Details
Andrew Cooper of Citrix reported a Xen stack corruption in the Linux
kernel. An unprivileged user in a 32bit PVOPS guest can cause the guest
kernel to crash, or operate erroneously.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 10.04
-
linux-image-2.6.32-45-generic
-
2.6.32-45.103
-
linux-image-2.6.32-45-powerpc-smp
-
2.6.32-45.103
-
linux-image-2.6.32-45-ia64
-
2.6.32-45.103
-
linux-image-2.6.32-45-lpia
-
2.6.32-45.103
-
linux-image-2.6.32-45-preempt
-
2.6.32-45.103
-
linux-image-2.6.32-45-sparc64-smp
-
2.6.32-45.103
-
linux-image-2.6.32-45-virtual
-
2.6.32-45.103
-
linux-image-2.6.32-45-sparc64
-
2.6.32-45.103
-
linux-image-2.6.32-45-generic-pae
-
2.6.32-45.103
-
linux-image-2.6.32-45-server
-
2.6.32-45.103
-
linux-image-2.6.32-45-powerpc
-
2.6.32-45.103
-
linux-image-2.6.32-45-386
-
2.6.32-45.103
-
linux-image-2.6.32-45-powerpc64-smp
-
2.6.32-45.103
-
linux-image-2.6.32-45-versatile
-
2.6.32-45.103
After a standard system update you need to reboot your computer to make
all the necessary changes.