First published: Sat Jul 05 2014(Updated: )
Andy Lutomirski discovered a flaw with the Linux kernel's ptrace syscall on x86_64 processors. An attacker could exploit this flaw to cause a denial of service (System Crash) or potential gain administrative privileges.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.11.0-24-generic-lpae | <3.11.0-24.42 | 3.11.0-24.42 |
Ubuntu gir1.2-packagekitglib-1.0 | =13.10 | |
All of | ||
ubuntu/linux-image-3.11.0-24-generic | <3.11.0-24.42 | 3.11.0-24.42 |
Ubuntu gir1.2-packagekitglib-1.0 | =13.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-2273-1 is considered high due to the potential for denial of service and administrative privilege escalation.
To fix USN-2273-1, upgrade the affected package to version 3.11.0-24.42 or later.
USN-2273-1 affects Ubuntu 13.10 installations running the Linux kernel versions prior to 3.11.0-24.42.
The vulnerability in USN-2273-1 is caused by a flaw in the ptrace syscall implementation on x86_64 processors.
Yes, USN-2273-1 can be exploited by attackers to cause a system crash due to the denial of service vulnerability.