Canonical patches two security vulnerabilities

Jul 24, 2015 02:27 GMT  ·  By

On July 23, Canonical posted a new Ubuntu Security Notice informing all users of the Ubuntu 12.04 LTS (Precise Pangolin) operating system about the immediate availability of a kernel update.

Two security vulnerabilities were patched: a flaw discovered in Linux kernel's user space memory copying for pipe iovecs, which could allow a local, unprivileged user to crash the host system by causing a denial of service or to gain root access, and a crash in Linux kernel's Berkeley Packet Filter (BPF) filter JIT optimization, which could allow a local attacker to crash the system by causing a denial of service.

"A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 12.04 LTS," says Canonical in the Ubuntu Security Notice USN-2678-1 published on July 23, 2015 along with new Ubuntu Security Notices for Ubuntu 15.04 and Ubuntu 14.04 LTS. "Several security issues were fixed in the kernel. The problem can be corrected by updating your system to the following package version."

Canonical urges all users of the Ubuntu 12.04 LTS (Precise Pangolin) operating system to update their systems as soon as possible in order to patch the security issues mentioned above. To update, run the Software Updater utility and apply all existing updates. After a reboot, make sure that the kernel packages have been upgraded to linux-image-3.2.0-88 (3.2.0-88.126).