=========================================================================Ubuntu Security Notice USN-1725-1
February 14, 2013

linux vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 10.04 LTS

Summary:

The system could be made to crash under certain conditions.

Software Description:
- linux: Linux kernel

Details:

Andrew Cooper of Citrix reported a Xen stack corruption in the Linux
kernel. An unprivileged user in a 32bit PVOPS guest can cause the guest
kernel to crash, or operate erroneously.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 10.04 LTS:
  linux-image-2.6.32-45-386       2.6.32-45.103
  linux-image-2.6.32-45-generic   2.6.32-45.103
  linux-image-2.6.32-45-generic-pae  2.6.32-45.103
  linux-image-2.6.32-45-ia64      2.6.32-45.103
  linux-image-2.6.32-45-lpia      2.6.32-45.103
  linux-image-2.6.32-45-powerpc   2.6.32-45.103
  linux-image-2.6.32-45-powerpc-smp  2.6.32-45.103
  linux-image-2.6.32-45-powerpc64-smp  2.6.32-45.103
  linux-image-2.6.32-45-preempt   2.6.32-45.103
  linux-image-2.6.32-45-server    2.6.32-45.103
  linux-image-2.6.32-45-sparc64   2.6.32-45.103
  linux-image-2.6.32-45-sparc64-smp  2.6.32-45.103
  linux-image-2.6.32-45-versatile  2.6.32-45.103
  linux-image-2.6.32-45-virtual   2.6.32-45.103

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-1725-1
  CVE-2013-0190

Package Information:
  https://launchpad.net/ubuntu/+source/linux/2.6.32-45.103

Ubuntu 1725-1: Linux kernel vulnerability

February 14, 2013
The system could be made to crash under certain conditions.

Summary

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 10.04 LTS: linux-image-2.6.32-45-386 2.6.32-45.103 linux-image-2.6.32-45-generic 2.6.32-45.103 linux-image-2.6.32-45-generic-pae 2.6.32-45.103 linux-image-2.6.32-45-ia64 2.6.32-45.103 linux-image-2.6.32-45-lpia 2.6.32-45.103 linux-image-2.6.32-45-powerpc 2.6.32-45.103 linux-image-2.6.32-45-powerpc-smp 2.6.32-45.103 linux-image-2.6.32-45-powerpc64-smp 2.6.32-45.103 linux-image-2.6.32-45-preempt 2.6.32-45.103 linux-image-2.6.32-45-server 2.6.32-45.103 linux-image-2.6.32-45-sparc64 2.6.32-45.103 linux-image-2.6.32-45-sparc64-smp 2.6.32-45.103 linux-image-2.6.32-45-versatile 2.6.32-45.103 linux-image-2.6.32-45-virtual 2.6.32-45.103 After a standard system update you need to reboot your computer to make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-1725-1

CVE-2013-0190

Severity
February 14, 2013

Package Information

https://launchpad.net/ubuntu/+source/linux/2.6.32-45.103

Related News