Canonical released two patches to fix the Ubuntu 12.04 LTS Kernel Vulnerability
Canonical released a Kernel update package for Ubuntu October 20 LTS (Precise Pangolin) in 12.04, which is mainly used to fix two Linux Kernel vulnerabilities.
- The first security defect is found in the Virtio network module of Linux Kernel. Kernel Memory Corruption may occur due to improper processing of fragments, and remote attackers may be allowed to launch denial-of-service attacks. In severe cases remote code can be executed to cause a system crash. For more information, see the CVE-2015-5156.
- The second kernel Vulnerability was found in the Linux kernel RDS (Reliable datainsockets) implementation method and could not correctly verify the message Socket. This vulnerability may cause DoS service interruption, for more details, refer to the CVE-2015-6937.
Canonical urges Ubuntu 12.04 LTS (Precise Pangolin) and its derivative systems (such as Kubuntu, Xubuntu, and Lubuntu) users to update the Kernel version.
After updating the kernel, it is best to restart the system and run the uname-a command to confirm that the kernel has been updated to the latest linux-image-3.2.0-92 (3.2.0-92.130) version.