Details
Alexander Nyberg discovered that ptrace() insufficiently validated
addresses on the amd64 platform so that it was possible to set an
invalid segment base. A local attacker could exploit this to crash the
kernel. This does not affect the i386 and powerpc platforms in any
way. (CAN-2005-0756)
Chris Wright discovered that the mmap() function could create illegal
memory maps (using the "mmap" function) with the start address
pointing beyond the end address. A local user could exploit this to
crash the kernel or possibly even execute arbitrary code with kernel
privileges. (CAN-2005-1265)
Alexander Nyberg discovered that ptrace() insufficiently validated
addresses on the amd64 platform so that it was possible to set an
invalid segment base. A local attacker could exploit this to crash the
kernel. This does not affect the i386 and powerpc platforms in any
way. (CAN-2005-0756)
Chris Wright discovered that the mmap() function could create illegal
memory maps (using the "mmap" function) with the start address
pointing beyond the end address. A local user could exploit this to
crash the kernel or possibly even execute arbitrary code with kernel
privileges. (CAN-2005-1265)
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.