USN-1607-1: Linux kernel vulnerabilities
11 October 2012
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 11.10
Several security issues were fixed in the kernel.
- linux - Linux kernel
Vadim Ponomarev discovered a flaw in the Linux kernel causing a reference leak when PID namespaces are used. A remote attacker could exploit this flaw causing a denial of service. (CVE-2012-2127)
A flaw was found in how the Linux kernel’s KVM (Kernel-based Virtual Machine) subsystem handled MSI (Message Signaled Interrupts). A local unprivileged user could exploit this flaw to cause a denial of service or potentially elevate privileges. (CVE-2012-2137)
Mathias Krause discover an error in Linux kernel’s Datagram Congestion Control Protocol (DCCP) Congestion Control Identifier (CCID) use. A local attack could exploit this flaw to cause a denial of service (crash) and potentially escalate privileges if the user can mmap page 0. (CVE-2013-1827)
The problem can be corrected by updating your system to the following package versions:
- Ubuntu 11.10
- linux-image-3.0.0-26-generic - 3.0.0-26.43
- linux-image-3.0.0-26-generic-pae - 3.0.0-26.43
- linux-image-3.0.0-26-omap - 3.0.0-26.43
- linux-image-3.0.0-26-powerpc - 3.0.0-26.43
- linux-image-3.0.0-26-powerpc-smp - 3.0.0-26.43
- linux-image-3.0.0-26-powerpc64-smp - 3.0.0-26.43
- linux-image-3.0.0-26-server - 3.0.0-26.43
- linux-image-3.0.0-26-virtual - 3.0.0-26.43
To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.
After a standard system update you need to reboot your computer to make all the necessary changes.