First published: Tue Nov 25 2014(Updated: )
Don Bailey discovered a flaw in the LZO decompress algorithm used by the Linux kernel. An attacker could exploit this flaw to cause a denial of service (memory corruption or OOPS). (CVE-2014-4608) Andy Lutomirski discovered that the Linux kernel was not checking the CAP_SYS_ADMIN when remounting filesystems to read-only. A local user could exploit this flaw to cause a denial of service (loss of writability). (CVE-2014-7975)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-2.6.32-372-ec2 | <2.6.32-372.89 | 2.6.32-372.89 |
Ubuntu gir1.2-packagekitglib-1.0 | =10.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-2416-1 has a medium severity rating due to potential denial of service caused by memory corruption.
To fix USN-2416-1, upgrade the linux-image-2.6.32-372-ec2 package to version 2.6.32-372.89 or later.
USN-2416-1 addresses CVE-2014-4608 and concerns a flaw in the LZO decompress algorithm.
Don Bailey discovered the flaw in the LZO decompress algorithm that led to USN-2416-1.
USN-2416-1 affects Ubuntu 10.04 with the linux-image-2.6.32-372-ec2 package.