=========================================================================Ubuntu Security Notice USN-2620-1
May 23, 2015

linux vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 LTS

Summary:

The system could be made to crash under certain conditions.

Software Description:
- linux: Linux kernel

Details:

A flaw was discovered in the Linux kernel's IPv4 networking when using TCP
fast open to initiate a connection. An unprivileged local user could
exploit this flaw to cause a denial of service (system crash).

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
  linux-image-3.13.0-53-generic   3.13.0-53.89
  linux-image-3.13.0-53-generic-lpae  3.13.0-53.89
  linux-image-3.13.0-53-lowlatency  3.13.0-53.89
  linux-image-3.13.0-53-powerpc-e500  3.13.0-53.89
  linux-image-3.13.0-53-powerpc-e500mc  3.13.0-53.89
  linux-image-3.13.0-53-powerpc-smp  3.13.0-53.89
  linux-image-3.13.0-53-powerpc64-emb  3.13.0-53.89
  linux-image-3.13.0-53-powerpc64-smp  3.13.0-53.89

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-2620-1
  CVE-2015-3332

Package Information:
  https://launchpad.net/ubuntu/+source/linux/3.13.0-53.89


Ubuntu 2620-1: Linux kernel vulnerability

May 23, 2015
The system could be made to crash under certain conditions.

Summary

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 LTS: linux-image-3.13.0-53-generic 3.13.0-53.89 linux-image-3.13.0-53-generic-lpae 3.13.0-53.89 linux-image-3.13.0-53-lowlatency 3.13.0-53.89 linux-image-3.13.0-53-powerpc-e500 3.13.0-53.89 linux-image-3.13.0-53-powerpc-e500mc 3.13.0-53.89 linux-image-3.13.0-53-powerpc-smp 3.13.0-53.89 linux-image-3.13.0-53-powerpc64-emb 3.13.0-53.89 linux-image-3.13.0-53-powerpc64-smp 3.13.0-53.89 After a standard system update you need to reboot your computer to make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-2620-1

CVE-2015-3332

Severity
May 23, 2015

Package Information

https://launchpad.net/ubuntu/+source/linux/3.13.0-53.89

Related News