A security vulnerability that was discovered in the Linux kernel affecting the Ubuntu 12.10 LTS (Quantal Quetzal) operating system, was announced by Canonical.CVE-2013-1763 is the kernel vulnerability found in the Linux kernel packages. The system could be made to crash or run programs as an administrator.
Mathias Krause discovered a bounds checking error for netlink messages requesting SOCK_DIAG_BY_FAMILY. An unprivileged local user could exploit this flaw to crash the system or run programs as an administrator.
The security flaws can be fixed if you upgrade your system(s) to the linux-image-3.5.0-25 (3.5.0-25.39).
Don't forget to reboot your computer after the upgrade!
ATTENTION: Due to an unavoidable ABI change, the kernel packages have a new version number, which will force you to reinstall and recompile all third-party kernel modules you might have installed. Moreover, if you use the linux-restricted-modules package, you have to update it as well to get modules that work with the new Linux kernel version.