Ubuntu 2421-1: Linux kernel vulnerabilities

    Date 24 Nov 2014
    Posted By LinuxSecurity Advisories
    Several security issues were fixed in the kernel.
    Ubuntu Security Notice USN-2421-1
    November 25, 2014
    linux vulnerabilities
    A security issue affects these releases of Ubuntu and its derivatives:
    - Ubuntu 14.10
    Several security issues were fixed in the kernel.
    Software Description:
    - linux: Linux kernel
    A flaw was discovered in how the Linux kernel's KVM (Kernel Virtual
    Machine) subsystem handles the CR4 control register at VM entry on Intel
    processors. A local host OS user can exploit this to cause a denial of
    service (kill arbitrary processes, or system disruption) by leveraging
    /dev/kvm access. (CVE-2014-3690)
    Don Bailey discovered a flaw in the LZO decompress algorithm used by the
    Linux kernel. An attacker could exploit this flaw to cause a denial of
    service (memory corruption or OOPS). (CVE-2014-4608)
    Andy Lutomirski discovered that the Linux kernel was not checking the
    CAP_SYS_ADMIN when remounting filesystems to read-only. A local user could
    exploit this flaw to cause a denial of service (loss of writability).
    Update instructions:
    The problem can be corrected by updating your system to the following
    package versions:
    Ubuntu 14.10:
      linux-image-3.16.0-25-generic   3.16.0-25.33
      linux-image-3.16.0-25-generic-lpae  3.16.0-25.33
      linux-image-3.16.0-25-lowlatency  3.16.0-25.33
      linux-image-3.16.0-25-powerpc-e500mc  3.16.0-25.33
      linux-image-3.16.0-25-powerpc-smp  3.16.0-25.33
      linux-image-3.16.0-25-powerpc64-emb  3.16.0-25.33
      linux-image-3.16.0-25-powerpc64-smp  3.16.0-25.33
    After a standard system update you need to reboot your computer to make
    all the necessary changes.
    ATTENTION: Due to an unavoidable ABI change the kernel updates have
    been given a new version number, which requires you to recompile and
    reinstall all third party kernel modules you might have installed. If
    you use linux-restricted-modules, you have to update that package as
    well to get modules which work with the new kernel version. Unless you
    manually uninstalled the standard kernel metapackages (e.g. linux-generic,
    linux-server, linux-powerpc), a standard system upgrade will automatically
    perform this as well.
      CVE-2014-3690, CVE-2014-4608, CVE-2014-7975
    Package Information:

    LinuxSecurity Poll

    If you are using full-disk encryption: are you concerned about the resulting performance hit?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    [{"id":"120","title":"Yes","votes":"7","type":"x","order":"1","pct":63.64,"resources":[]},{"id":"121","title":"No ","votes":"4","type":"x","order":"2","pct":36.36,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200


    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.