USN-2600-2: Linux kernel regression

9 May 2015

linux regression

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.10

Summary

USN-2600-1 Introduced a regression in the Linux kernel.

Software Description

  • linux - Linux kernel

Details

USN-2600-1 fixed vulnerabilities in the Linux kernel, however an unrelated regression in the auditing of some path names was introduced. Due to the regression the system could crash under certain conditions.

This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

A race condition between chown() and execve() was discovered in the Linux kernel. A local attacker could exploit this race by using chown on a setuid-user-binary to gain administrative privileges.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.10
linux-image-3.16.0-37-generic - 3.16.0-37.51
linux-image-3.16.0-37-generic-lpae - 3.16.0-37.51
linux-image-3.16.0-37-lowlatency - 3.16.0-37.51
linux-image-3.16.0-37-powerpc-e500mc - 3.16.0-37.51
linux-image-3.16.0-37-powerpc-smp - 3.16.0-37.51
linux-image-3.16.0-37-powerpc64-emb - 3.16.0-37.51
linux-image-3.16.0-37-powerpc64-smp - 3.16.0-37.51

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make all the necessary changes.

References