USN-2525-1: Linux kernel vulnerability
12 March 2015
The system could be made to crash or run programs as an administrator.
Releases
Packages
- linux - Linux kernel
Details
It was discovered that the Linux kernel's Infiniband subsystem did not
properly sanitize its input parameters while registering memory regions
from userspace. A local user could exploit this flaw to cause a denial of
service (system crash) or to potentially gain administrative privileges.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 10.04
-
linux-image-2.6.32-73-lpia
-
2.6.32-73.141
-
linux-image-2.6.32-73-powerpc64-smp
-
2.6.32-73.141
-
linux-image-2.6.32-73-generic-pae
-
2.6.32-73.141
-
linux-image-2.6.32-73-sparc64
-
2.6.32-73.141
-
linux-image-2.6.32-73-generic
-
2.6.32-73.141
-
linux-image-2.6.32-73-virtual
-
2.6.32-73.141
-
linux-image-2.6.32-73-ia64
-
2.6.32-73.141
-
linux-image-2.6.32-73-powerpc-smp
-
2.6.32-73.141
-
linux-image-2.6.32-73-386
-
2.6.32-73.141
-
linux-image-2.6.32-73-powerpc
-
2.6.32-73.141
-
linux-image-2.6.32-73-server
-
2.6.32-73.141
-
linux-image-2.6.32-73-versatile
-
2.6.32-73.141
-
linux-image-2.6.32-73-sparc64-smp
-
2.6.32-73.141
-
linux-image-2.6.32-73-preempt
-
2.6.32-73.141
After a standard system update you need to reboot your computer to make
all the necessary changes.
References
Related notices
- USN-2529-1: linux-image-3.16.0-31-powerpc64-emb, linux-image-3.16.0-31-powerpc-e500mc, linux-image-3.16.0-31-generic-lpae, linux-image-3.16.0-31-powerpc-smp, linux-lts-utopic, linux-image-3.16.0-31-generic, linux-image-extra-3.16.0-31-generic, linux-image-3.16.0-31-powerpc64-smp, linux-image-3.16.0-31-lowlatency
- USN-2526-1: linux-image-3.2.0-77-omap, linux-image-3.2.0-77-powerpc-smp, linux-image-3.2.0-77-powerpc64-smp, linux-image-3.2.0-77-highbank, linux, linux-image-3.2.0-77-generic, linux-image-3.2.0-77-virtual, linux-image-3.2.0-77-generic-pae
- USN-2527-1: linux-image-3.13.0-46-generic-lpae, linux-image-3.13.0-46-generic, linux-lts-trusty
- USN-2561-1: linux-image-3.2.0-1462-omap4, linux-ti-omap4
- USN-2530-1: linux-image-3.16.0-31-powerpc64-emb, linux-image-3.16.0-31-powerpc-e500mc, linux-image-3.16.0-31-generic-lpae, linux, linux-image-3.16.0-31-powerpc-smp, linux-image-3.16.0-31-generic, linux-image-3.16.0-31-powerpc64-smp, linux-image-3.16.0-31-lowlatency
- USN-2528-1: linux-image-extra-3.13.0-46-generic, linux-image-3.13.0-46-generic-lpae, linux-image-3.13.0-46-powerpc-smp, linux-image-3.13.0-46-powerpc-e500, linux-image-3.13.0-46-powerpc64-smp, linux-image-3.13.0-46-powerpc-e500mc, linux, linux-image-3.13.0-46-generic, linux-image-3.13.0-46-powerpc64-emb, linux-image-3.13.0-46-lowlatency