First published: Sat Apr 26 2014(Updated: )
A flaw was discovered in the Kernel Virtual Machine (KVM) subsystem of the Linux kernel. A guest OS user could exploit this flaw to execute arbitrary code on the host OS. (CVE-2014-0049) Al Viro discovered an error in how CIFS in the Linux kernel handles uncached write operations. An unprivileged local user could exploit this flaw to cause a denial of service (system crash), obtain sensitive information from kernel memory, or possibly gain privileges. (CVE-2014-0069)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.11.0-20-generic-lpae | <3.11.0-20.34 | 3.11.0-20.34 |
Ubuntu gir1.2-packagekitglib-1.0 | =13.10 | |
All of | ||
ubuntu/linux-image-3.11.0-20-generic | <3.11.0-20.34 | 3.11.0-20.34 |
Ubuntu gir1.2-packagekitglib-1.0 | =13.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-2179-1 is classified as a high-severity vulnerability due to the potential for arbitrary code execution on the host OS.
To fix USN-2179-1, update the Linux kernel to version 3.11.0-20.34 or later.
USN-2179-1 affects Ubuntu 13.10 systems running the linux-image-3.11.0-20-generic-lpae and linux-image-3.11.0-20-generic packages.
USN-2179-1 impacts the Kernel Virtual Machine (KVM) subsystem of the Linux kernel.
USN-2179-1 can be exploited by a guest OS user to execute arbitrary code on the host OS, posing a significant security risk.