A security vulnerability that was discovered in the Linux kernel, affecting the Ubuntu 12.04 LTS (Precise Pangolin) operating system, has been announced by Canonical.
According to Canonical
, the system could be made to crash or run programs as an administrator.
A bound-checking error has been discovered for netlink messages requesting SOCK_DIAG_BY_FAMILY. An unprivileged local user could exploit this flaw to crash the system or run programs as an administrator.
The security flaws can be fixed if you upgrade your system(s) to the linux-image-3.5.0-25-generic (3.5.0-25.39~precise1).
Don't forget to reboot your computer after the upgrade!
Due to an unavoidable ABI change, the kernel packages have a new version number, which will force you to reinstall and recompile all third-party kernel modules you might have installed. Moreover, if you use the linux-restricted-modules package, you have to update it as well to get modules that work with the new Linux kernel version.