Releases
Packages
- linux – Linux kernel
Details
A flaw was discovered in the Linux kernel’s pseudo tty (pty) device. An
unprivileged user could exploit this flaw to cause a denial of service
(system crash) or potentially gain administrator privileges.
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 10.04
- linux-image-2.6.32-58-386 – 2.6.32-58.121
- linux-image-2.6.32-58-lpia – 2.6.32-58.121
- linux-image-2.6.32-58-ia64 – 2.6.32-58.121
- linux-image-2.6.32-58-versatile – 2.6.32-58.121
- linux-image-2.6.32-58-server – 2.6.32-58.121
- linux-image-2.6.32-58-powerpc64-smp – 2.6.32-58.121
- linux-image-2.6.32-58-generic-pae – 2.6.32-58.121
- linux-image-2.6.32-58-powerpc-smp – 2.6.32-58.121
- linux-image-2.6.32-58-generic – 2.6.32-58.121
- linux-image-2.6.32-58-virtual – 2.6.32-58.121
- linux-image-2.6.32-58-sparc64-smp – 2.6.32-58.121
- linux-image-2.6.32-58-powerpc – 2.6.32-58.121
- linux-image-2.6.32-58-preempt – 2.6.32-58.121
- linux-image-2.6.32-58-sparc64 – 2.6.32-58.121
After a standard system update you need to reboot your computer to make
all the necessary changes.
References
Related notices
- USN-2197-1: linux-image-2.6.32-363-ec2, linux-ec2
- USN-2198-1: linux-image-3.2.0-61-generic, linux, linux-image-3.2.0-61-generic-pae, linux-image-3.2.0-61-powerpc-smp, linux-image-3.2.0-61-highbank, linux-image-3.2.0-61-virtual, linux-image-3.2.0-61-powerpc64-smp, linux-image-3.2.0-61-omap
- USN-2260-1: linux-image-3.13.0-30-generic-lpae, linux-lts-trusty, linux-image-3.13.0-30-generic
- USN-2201-1: linux-image-3.11.0-20-generic-lpae, linux-image-3.11.0-20-generic, linux-lts-saucy
- USN-2203-1: linux-image-3.11.0-20-generic-lpae, linux, linux-image-3.11.0-20-generic
- USN-2200-1: linux-image-3.8.0-39-generic, linux-lts-raring
- USN-2204-1: linux, linux-image-3.13.0-24-powerpc-e500mc, linux-image-3.13.0-24-powerpc64-emb, linux-image-3.13.0-24-generic, linux-image-3.13.0-24-lowlatency, linux-image-3.13.0-24-powerpc-smp, linux-image-3.13.0-24-generic-lpae, linux-image-extra-3.13.0-24-generic, linux-image-3.13.0-24-powerpc-e500, linux-image-3.13.0-24-powerpc64-smp
- USN-2199-1: linux-lts-quantal, linux-image-3.5.0-49-generic
- USN-2227-1: linux-image-3.2.0-1446-omap4, linux-ti-omap4
- USN-2202-1: linux, linux-image-3.5.0-49-powerpc64-smp, linux-image-3.5.0-49-omap, linux-image-3.5.0-49-highbank, linux-image-3.5.0-49-generic, linux-image-3.5.0-49-powerpc-smp
Source:
https://ubuntu.com/security/notices/USN-2196-1
Related posts
Hot Topics
Categories
Critical vulnerabiliities (81)
cyber crime (1)
Cyber Security (63)
Data breach (2)
DER (11)
Exploit (28)
Hacks (78)
ICS (506)
Industrial IoT (IIoT) (29)
IoT Security (74)
Market (49)
News (1204)
Recommendations (59)
Remediation (7)
Reports (12)
Security Patches (12)
Standards (3)
Tools (6)
Uncategorized (29)
Vulnerabilities (1077)
White Papers (32)
Stay connected