First published: Wed Jun 21 2017(Updated: )
USN-3335-1 fixed vulnerabilities in the Linux kernel for Ubuntu 14.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 14.04 LTS for Ubuntu 12.04 ESM. It was discovered that the stack guard page for processes in the Linux kernel was not sufficiently large enough to prevent overlapping with the heap. An attacker could leverage this with another vulnerability to execute arbitrary code and gain administrative privileges
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.13.0-121-generic | <3.13.0-121.170~precise1 | 3.13.0-121.170~precise1 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-generic-lpae-lts-trusty | <3.13.0.121.112 | 3.13.0.121.112 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-generic-lts-trusty | <3.13.0.121.112 | 3.13.0.121.112 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-3.13.0-121-generic-lpae | <3.13.0-121.170~precise1 | 3.13.0-121.170~precise1 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Linux kernel vulnerability is USN-3335-2.
The affected software for this vulnerability is Ubuntu 12.04 LTS with Linux kernel versions 3.13.0-121.170~precise1, 3.13.0.121.112, or 3.13.0-121.170~precise1 (depending on the specific package).
The severity of this vulnerability is not specified in the provided information.
The recommended remedy for this vulnerability is to update the Linux kernel to the specified versions: 3.13.0-121.170~precise1, 3.13.0.121.112, or 3.13.0-121.170~precise1.
You can find more information about this vulnerability on the Ubuntu Security Notices website with the reference USN-3335-2.