=========================================================================Ubuntu Security Notice USN-1650-1
November 30, 2012

linux vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 8.04 LTS

Summary:

The system could be made to crash under certain conditions.

Software Description:
- linux: Linux kernel

Details:

Rodrigo Freire discovered a flaw in the Linux kernel's TCP illinois
congestion control algorithm. A local attacker could use this to cause a
denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 8.04 LTS:
  linux-image-2.6.24-32-386       2.6.24-32.106
  linux-image-2.6.24-32-generic   2.6.24-32.106
  linux-image-2.6.24-32-hppa32    2.6.24-32.106
  linux-image-2.6.24-32-hppa64    2.6.24-32.106
  linux-image-2.6.24-32-itanium   2.6.24-32.106
  linux-image-2.6.24-32-lpia      2.6.24-32.106
  linux-image-2.6.24-32-lpiacompat  2.6.24-32.106
  linux-image-2.6.24-32-mckinley  2.6.24-32.106
  linux-image-2.6.24-32-openvz    2.6.24-32.106
  linux-image-2.6.24-32-powerpc   2.6.24-32.106
  linux-image-2.6.24-32-powerpc-smp  2.6.24-32.106
  linux-image-2.6.24-32-powerpc64-smp  2.6.24-32.106
  linux-image-2.6.24-32-rt        2.6.24-32.106
  linux-image-2.6.24-32-server    2.6.24-32.106
  linux-image-2.6.24-32-sparc64   2.6.24-32.106
  linux-image-2.6.24-32-sparc64-smp  2.6.24-32.106
  linux-image-2.6.24-32-virtual   2.6.24-32.106
  linux-image-2.6.24-32-xen       2.6.24-32.106

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-1650-1
  CVE-2012-4565

Package Information:
  https://launchpad.net/ubuntu/+source/linux/2.6.24-32.106

Ubuntu 1650-1: Linux kernel vulnerability

November 30, 2012
The system could be made to crash under certain conditions.

Summary

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 8.04 LTS: linux-image-2.6.24-32-386 2.6.24-32.106 linux-image-2.6.24-32-generic 2.6.24-32.106 linux-image-2.6.24-32-hppa32 2.6.24-32.106 linux-image-2.6.24-32-hppa64 2.6.24-32.106 linux-image-2.6.24-32-itanium 2.6.24-32.106 linux-image-2.6.24-32-lpia 2.6.24-32.106 linux-image-2.6.24-32-lpiacompat 2.6.24-32.106 linux-image-2.6.24-32-mckinley 2.6.24-32.106 linux-image-2.6.24-32-openvz 2.6.24-32.106 linux-image-2.6.24-32-powerpc 2.6.24-32.106 linux-image-2.6.24-32-powerpc-smp 2.6.24-32.106 linux-image-2.6.24-32-powerpc64-smp 2.6.24-32.106 linux-image-2.6.24-32-rt 2.6.24-32.106 linux-image-2.6.24-32-server 2.6.24-32.106 linux-image-2.6.24-32-sparc64 2.6.24-32.106 linux-image-2.6.24-32-sparc64-smp 2.6.24-32.106 linux-image-2.6.24-32-virtual 2.6.24-32.106 linux-image-2.6.24-32-xen 2.6.24-32.106 After a standard system update you need to reboot your computer to make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-1650-1

CVE-2012-4565

Severity
November 30, 2012

Package Information

https://launchpad.net/ubuntu/+source/linux/2.6.24-32.106

Related News