[USN-2600-2] Linux kernel regression

John Johansen john.johansen at canonical.com
Sat May 9 00:48:11 UTC 2015


==========================================================================
Ubuntu Security Notice USN-2600-2
May 09, 2015

linux regression
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.10

Summary:

USN-2600-1 Introduced a regression in the Linux kernel.

Software Description:
- linux: Linux kernel

Details:

USN-2600-1 fixed vulnerabilities in the Linux kernel, however an unrelated
regression in the auditing of some path names was introduced. Due to the
regression the system could crash under certain conditions.

This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

 A race condition between chown() and execve() was discovered in the Linux
 kernel. A local attacker could exploit this race by using chown on a
 setuid-user-binary to gain administrative privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.10:
  linux-image-3.16.0-37-generic   3.16.0-37.51
  linux-image-3.16.0-37-generic-lpae  3.16.0-37.51
  linux-image-3.16.0-37-lowlatency  3.16.0-37.51
  linux-image-3.16.0-37-powerpc-e500mc  3.16.0-37.51
  linux-image-3.16.0-37-powerpc-smp  3.16.0-37.51
  linux-image-3.16.0-37-powerpc64-emb  3.16.0-37.51
  linux-image-3.16.0-37-powerpc64-smp  3.16.0-37.51

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
  http://www.ubuntu.com/usn/usn-2600-2
  http://www.ubuntu.com/usn/usn-2600-1
  https://launchpad.net/bugs/1450442

Package Information:
  https://launchpad.net/ubuntu/+source/linux/3.16.0-37.51


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20150508/05033c04/attachment.sig>


More information about the ubuntu-security-announce mailing list