A few days before the announcement for the end of life of Ubuntu 13.04 (Raring Ringtail), Canonical has released the last major update of its soon-to-be unsupported Ubuntu operating system, fixing no more than nine vulnerabilities discovered by various developers in the upstream kernel packages.
The first security issue was a flaw discovered in the Linux kernel's UDP Fragmentation Offload (UFO), which could allow an unprivileged local user to cause a DoS (Denial of Service) attack; the second one is about multiple integer overflow flaws discovered in Linux kernel’s Alchemy LCD frame- buffer drivers, which could allow an unprivileged local user to gain administrative privileges.
The third security issue is related to a buffer overflow discovered in the Ozmo Devices USB over Wi-Fi devices, which could allow a local user to cause a DoS (Denial of Service) attack; the fourth flaw was discovered in the Linux kernel's driver for Agere Systems HERMES II Wireless PC cards, and it could allow a local user to gain administrative privileges.
The fifth and sixth flaws were discovered in the Linux kernel's drivers for Beceem WIMAX chipset-based devices and the SystemBase Multi-2/PCI serial card, which could allow an unprivileged local user to obtain sensitive information from kernel memory. The seventh flaw was discovered in Linux kernel's compat ioctls for Adaptec AACRAID scsi raid devices, and it could allow an unprivileged local user to send administrative commands to the respective devices.
Last but not least, the eighth and ninth flaws were discovered in the Linux kernel's userspace IO (uio) driver and radiotap header parsing, which could allow a local or a remote user to cause a DoS (Denial of Service) attack. We remind everyone who uses Ubuntu 13.04 that it will no longer be supported with security updates starting January 27, 2014.
All the above security flaws can be fixed if you upgrade your Ubuntu 13.04 operating system(s) to the linux-image-3.8.0-35-generic (3.8.0-35.50) package. To apply the update, just run the Update Manager application included in your system. For more details, take a look at the instructions provided by Canonical at https://wiki.ubuntu.com/Security/Upgrades. Don't forget to reboot your computer after the upgrade!