Rapid7 Vulnerability & Exploit Database

USN-2599-2: Linux kernel (Utopic HWE) vulnerability

Back to Search

USN-2599-2: Linux kernel (Utopic HWE) vulnerability

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
05/08/2015
Created
07/25/2018
Added
05/11/2015
Modified
07/09/2020

Description

USN-2599-1 fixed vulnerabilities in the Linux kernel, however an unrelatedregression in the auditing of some path names was introduced. Due to theregression the system could crash under certain conditions. This update fixes the problem. We apologize for the inconvenience. Original advisory details: A race condition between chown() and execve() was discovered in the Linux kernel. A local attacker could exploit this race by using chown on a setuid-user-binary to gain administrative privileges. The problem can be corrected by updating your system to the following package version: To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. LP: 1450442

Solution(s)

  • ubuntu-upgrade-linux-image-3-16-0-37-generic
  • ubuntu-upgrade-linux-image-3-16-0-37-generic-lpae
  • ubuntu-upgrade-linux-image-3-16-0-37-lowlatency
  • ubuntu-upgrade-linux-image-3-16-0-37-powerpc-e500mc
  • ubuntu-upgrade-linux-image-3-16-0-37-powerpc-smp
  • ubuntu-upgrade-linux-image-3-16-0-37-powerpc64-emb
  • ubuntu-upgrade-linux-image-3-16-0-37-powerpc64-smp

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;