Canonical released the kernel update package for Ubuntu12.04LTS (PrecisePangolin) on April 9, October 20. It is mainly used to fix two LinuxKernel vulnerabilities. The first security defect is found in the Virtio network module of LinuxKernel. Kernel Memory Corruption may occur due to improper fragment processing, and remote attackers may be allowed to launch denial-of-service attacks. In severe cases, attackers can execute remote code to crash the system. For more information, see
Canonical released a Kernel update package for Ubuntu October 20 LTS (Precise Pangolin) in 12.04, which is mainly used to fix two Linux Kernel vulnerabilities.
- The first security defect is found in the Virtio network module of Linux Kernel. Kernel Memory Corruption may occur due to improper processing of fragments, and remote attackers may be allowed to launch denial-of-service attacks. In severe cases remote code can be executed to cause a system crash. For more information, see the CVE-2015-5156.
- The second kernel Vulnerability was found in the Linux kernel RDS (Reliable datainsockets) implementation method and could not correctly verify the message Socket. This vulnerability may cause DoS service interruption, for more details, refer to the CVE-2015-6937.
Canonical urges Ubuntu 12.04 LTS (Precise Pangolin) and its derivative systems (such as Kubuntu, Xubuntu, and Lubuntu) users to update the Kernel version.
After updating the kernel, it is best to restart the system and run the uname-a command to confirm that the kernel has been updated to the latest linux-image-3.2.0-92 (3.2.0-92.130) version.
For more information about Ubuntu, see Ubuntu special page http://www.linuxidc.com/topicnews.aspx? Tid = 2
This article permanently updates the link address: Http://www.linuxidc.com/Linux/2015-10/124426.htm