First published: Sat Apr 26 2014(Updated: )
A flaw was discovered in the Kernel Virtual Machine (KVM) subsystem of the Linux kernel. A guest OS user could exploit this flaw to execute arbitrary code on the host OS. (CVE-2014-0049) Al Viro discovered an error in how CIFS in the Linux kernel handles uncached write operations. An unprivileged local user could exploit this flaw to cause a denial of service (system crash), obtain sensitive information from kernel memory, or possibly gain privileges. (CVE-2014-0069)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.5.0-49-highbank | <3.5.0-49.73 | 3.5.0-49.73 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 | |
All of | ||
ubuntu/linux-image-3.5.0-49-powerpc-smp | <3.5.0-49.73 | 3.5.0-49.73 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 | |
All of | ||
ubuntu/linux-image-3.5.0-49-omap | <3.5.0-49.73 | 3.5.0-49.73 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 | |
All of | ||
ubuntu/linux-image-3.5.0-49-powerpc64-smp | <3.5.0-49.73 | 3.5.0-49.73 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 | |
All of | ||
ubuntu/linux-image-3.5.0-49-generic | <3.5.0-49.73 | 3.5.0-49.73 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-2178-1 addresses a flaw in the Kernel Virtual Machine (KVM) subsystem of the Linux kernel that allows a guest OS user to execute arbitrary code on the host OS.
The severity of vulnerability USN-2178-1 is critical due to the potential for remote code execution on the host system.
To fix vulnerability USN-2178-1, you should update to the latest kernel version 3.5.0-49.73 or higher if you are using Ubuntu 12.10.
Ubuntu 12.10 is the affected version for the vulnerability USN-2178-1.
The packages affected by vulnerability USN-2178-1 include linux-image-3.5.0-49-highbank, linux-image-3.5.0-49-generic, and several others within the same version range.