Ubuntu Security Notice USN-2600-2
8th May, 2015
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.10
USN-2600-1 Introduced a regression in the Linux kernel.
- linux – Linux kernel
USN-2600-1 fixed vulnerabilities in the Linux kernel, however an unrelated
regression in the auditing of some path names was introduced. Due to the
regression the system could crash under certain conditions.
This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
A race condition between chown() and execve() was discovered in the Linux
kernel. A local attacker could exploit this race by using chown on a
setuid-user-binary to gain administrative privileges.
The problem can be corrected by updating your system to the following package version:
- Ubuntu 14.10:
- linux-image-3.16.0-37-powerpc64-emb 3.16.0-37.51
- linux-image-3.16.0-37-lowlatency 3.16.0-37.51
- linux-image-3.16.0-37-powerpc64-smp 3.16.0-37.51
- linux-image-3.16.0-37-generic-lpae 3.16.0-37.51
- linux-image-3.16.0-37-powerpc-smp 3.16.0-37.51
- linux-image-3.16.0-37-generic 3.16.0-37.51
- linux-image-3.16.0-37-powerpc-e500mc 3.16.0-37.51
To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.
After a standard system update you need to reboot your computer to make
all the necessary changes.
This entry passed through the Full-Text RSS service – if this is your content and you’re reading it on someone else’s site, please read the FAQ at fivefilters.org/content-only/faq.php#publishers.