USN-2158-1: Linux kernel (Raring HWE) vulnerabilities
Publication date
1 April 2014
Overview
Several security issues were fixed in the kernel.
Releases
Packages
- linux-lts-raring - Linux hardware enablement kernel from Raring
Details
Stephan Mueller reported an error in the Linux kernel's ansi cprng random
number generator. This flaw makes it easier for a local attacker to break
cryptographic protections. (CVE-2013-4345)
Nico Golde and Fabian Yamaguchi reported buffer underflow errors in the
implementation of the XFS filesystem in the Linux kernel. A local user with
CAP_SYS_ADMIN could exploit these flaw to cause a denial of service (memory
corruption) or possibly other unspecified issues. (CVE-2013-6382)
An information leak was discovered in the Linux kernel when built with the
NetFilter Connection Tracking (NF_CONNTRACK) support for IRC protocol
(NF_NAT_IRC). A remote attacker could exploit this flaw to obtain
potentially sensitive kernel information when communicating over a client-
to-client IRC connection(/dcc) via a NAT-ed network. (
Stephan Mueller reported an error in the Linux kernel's ansi cprng random
number generator. This flaw makes it easier for a local attacker to break
cryptographic protections. (CVE-2013-4345)
Nico Golde and Fabian Yamaguchi reported buffer underflow errors in the
implementation of the XFS filesystem in the Linux kernel. A local user with
CAP_SYS_ADMIN could exploit these flaw to cause a denial of service (memory
corruption) or possibly other unspecified issues. (CVE-2013-6382)
An information leak was discovered in the Linux kernel when built with the
NetFilter Connection Tracking (NF_CONNTRACK) support for IRC protocol
(NF_NAT_IRC). A remote attacker could exploit this flaw to obtain
potentially sensitive kernel information when communicating over a client-
to-client IRC connection(/dcc) via a NAT-ed network. (CVE-2014-1690)
Update instructions
After a standard system update you need to reboot your computer to make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
12.04 precise | linux-image-3.8.0-38-generic – 3.8.0-38.56~precise1 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.
Related notices
- USN-2141-1
- USN-2140-1
- USN-2139-1
- USN-2138-1
- USN-2137-1
- USN-2135-1
- USN-2129-1
- USN-2128-1
- USN-2117-1
- USN-2113-1
- USN-2141-1
- USN-2140-1
- USN-2139-1
- USN-2138-1
- USN-2137-1
- USN-2135-1
- USN-2129-1
- USN-2128-1
- USN-2117-1
- USN-2113-1
- USN-2110-1
- USN-2109-1
- USN-2076-1
- USN-2075-1
- USN-2074-1
- USN-2072-1
- USN-2071-1
- USN-2070-1
- USN-2068-1
- USN-2065-1
- USN-2064-1
Have additional questions?