USN-2220-1: Linux kernel (EC2) vulnerabilities
Publication date
26 May 2014
Overview
Several security issues were fixed in the kernel.
Releases
Packages
- linux-ec2 - Linux kernel for EC2
Details
Matthew Daley reported an information leak in the floppy disk driver of the
Linux kernel. An unprivileged local user could exploit this flaw to obtain
potentially sensitive information from kernel memory. (CVE-2014-1738)
Matthew Daley reported a flaw in the handling of ioctl commands by the
floppy disk driver in the Linux kernel. An unprivileged local user could
exploit this flaw to gain administrative privileges if the floppy disk
module is loaded. (CVE-2014-1737)
A flaw was discovered in the Reliable Datagram Sockets (RDS) protocol
implementation in the Linux kernel for systems that lack RDS transports. An
unprivileged local user could exploit this flaw to cause a denial of
service (system crash). (CVE-2013-7339)
An error was discovered in the Reliable Datagram Sockets (RDS) protocol
stack in the Linux...
Matthew Daley reported an information leak in the floppy disk driver of the
Linux kernel. An unprivileged local user could exploit this flaw to obtain
potentially sensitive information from kernel memory. (CVE-2014-1738)
Matthew Daley reported a flaw in the handling of ioctl commands by the
floppy disk driver in the Linux kernel. An unprivileged local user could
exploit this flaw to gain administrative privileges if the floppy disk
module is loaded. (CVE-2014-1737)
A flaw was discovered in the Reliable Datagram Sockets (RDS) protocol
implementation in the Linux kernel for systems that lack RDS transports. An
unprivileged local user could exploit this flaw to cause a denial of
service (system crash). (CVE-2013-7339)
An error was discovered in the Reliable Datagram Sockets (RDS) protocol
stack in the Linux kernel. A local user could exploit this flaw to cause a
denial of service (system crash) or possibly have unspecified other impact.
(CVE-2014-2678)
Update instructions
After a standard system update you need to reboot your computer to make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
10.04 lucid | linux-image-2.6.32-364-ec2 – 2.6.32-364.77 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.
References
Related notices
- USN-2260-1
- USN-2228-1
- USN-2227-1
- USN-2226-1
- USN-2225-1
- USN-2224-1
- USN-2223-1
- USN-2221-1
- USN-2219-1
- USN-2141-1
- USN-2260-1
- USN-2228-1
- USN-2227-1
- USN-2226-1
- USN-2225-1
- USN-2224-1
- USN-2223-1
- USN-2221-1
- USN-2219-1
- USN-2141-1
- USN-2136-1
- USN-2135-1
- USN-2134-1
- USN-2133-1
- USN-2117-1
- USN-2113-1
Have additional questions?