USN-143-1: Linux amd64 kernel vulnerabilities

Publication date

27 June 2005

Overview

Linux amd64 kernel vulnerabilities

Releases


Details

A Denial of Service vulnerability has been discovered in the ptrace()
call on the amd64 platform. By calling ptrace() with specially crafted
("non-canonical") addresses, a local attacker could cause the kernel
to crash. This only affects the amd64 platform. (CAN-2005-1762)

ZouNanHai discovered that a local user could hang the kernel by
invoking syscall() with specially crafted arguments. This only affects
the amd64 platform when running in the 32 bit compatibility mode.
(CAN-2005-1765)

A Denial of Service vulnerability has been discovered in the ptrace()
call on the amd64 platform. By calling ptrace() with specially crafted
("non-canonical") addresses, a local attacker could cause the kernel
to crash. This only affects the amd64 platform. (CAN-2005-1762)

ZouNanHai discovered that a local user could hang the kernel by
invoking syscall() with specially crafted arguments. This only affects
the amd64 platform when running in the 32 bit compatibility mode.
(CAN-2005-1765)

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:


Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›