=========================================================================Ubuntu Security Notice USN-1555-1
September 05, 2012

linux vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 10.04 LTS

Summary:

Several security issues were fixed in the kernel.

Software Description:
- linux: Linux kernel

Details:

Chen Haogang discovered an integer overflow that could result in memory
corruption. A local unprivileged user could use this to crash the system.
(CVE-2012-0044)

A flaw was found in the Linux kernel's Reliable Datagram Sockets (RDS)
protocol implementation. A local, unprivileged user could use this flaw to
cause a denial of service. (CVE-2012-2372)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 10.04 LTS:
  linux-image-2.6.32-42-386       2.6.32-42.96
  linux-image-2.6.32-42-generic   2.6.32-42.96
  linux-image-2.6.32-42-generic-pae  2.6.32-42.96
  linux-image-2.6.32-42-ia64      2.6.32-42.96
  linux-image-2.6.32-42-lpia      2.6.32-42.96
  linux-image-2.6.32-42-powerpc   2.6.32-42.96
  linux-image-2.6.32-42-powerpc-smp  2.6.32-42.96
  linux-image-2.6.32-42-powerpc64-smp  2.6.32-42.96
  linux-image-2.6.32-42-preempt   2.6.32-42.96
  linux-image-2.6.32-42-server    2.6.32-42.96
  linux-image-2.6.32-42-sparc64   2.6.32-42.96
  linux-image-2.6.32-42-sparc64-smp  2.6.32-42.96
  linux-image-2.6.32-42-versatile  2.6.32-42.96
  linux-image-2.6.32-42-virtual   2.6.32-42.96

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-1555-1
  CVE-2012-0044, CVE-2012-2372

Package Information:
  https://launchpad.net/ubuntu/+source/linux/2.6.32-42.96

Ubuntu 1555-1: Linux kernel vulnerabilities

September 5, 2012
Several security issues were fixed in the kernel.

Summary

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 10.04 LTS: linux-image-2.6.32-42-386 2.6.32-42.96 linux-image-2.6.32-42-generic 2.6.32-42.96 linux-image-2.6.32-42-generic-pae 2.6.32-42.96 linux-image-2.6.32-42-ia64 2.6.32-42.96 linux-image-2.6.32-42-lpia 2.6.32-42.96 linux-image-2.6.32-42-powerpc 2.6.32-42.96 linux-image-2.6.32-42-powerpc-smp 2.6.32-42.96 linux-image-2.6.32-42-powerpc64-smp 2.6.32-42.96 linux-image-2.6.32-42-preempt 2.6.32-42.96 linux-image-2.6.32-42-server 2.6.32-42.96 linux-image-2.6.32-42-sparc64 2.6.32-42.96 linux-image-2.6.32-42-sparc64-smp 2.6.32-42.96 linux-image-2.6.32-42-versatile 2.6.32-42.96 linux-image-2.6.32-42-virtual 2.6.32-42.96 After a standard system update you need to reboot your computer to make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-1555-1

CVE-2012-0044, CVE-2012-2372

Severity
September 05, 2012

Package Information

https://launchpad.net/ubuntu/+source/linux/2.6.32-42.96

Related News