No Image

USN-2857-1: Linux kernel vulnerability

2016-01-06 KENNETH 0

Ubuntu Security Notice USN-2857-1 5th January, 2016 linux vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 15.04 Summary The system could be made to run programs as an administrator. Software description linux – Linux kernel Details Nathan Williams discovered that overlayfs in the Linux kernel incorrectlyhandled setattr operations. A local unprivileged attacker could use this tocreate files with administrative permission attributes and executearbitrary code with elevated privileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 15.04: linux-image-3.19.0-43-generic 3.19.0-43.49 linux-image-3.19.0-43-lowlatency 3.19.0-43.49 linux-image-3.19.0-43-powerpc64-smp 3.19.0-43.49 linux-image-3.19.0-43-generic-lpae 3.19.0-43.49 linux-image-3.19.0-43-powerpc64-emb 3.19.0-43.49 linux-image-3.19.0-43-powerpc-smp 3.19.0-43.49 linux-image-3.19.0-43-powerpc-e500mc 3.19.0-43.49 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates havebeen [ more… ]

No Image

USN-2857-2: Linux kernel (Vivid HWE) vulnerability

2016-01-06 KENNETH 0

Ubuntu Security Notice USN-2857-2 5th January, 2016 linux-lts-vivid vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 14.04 LTS Summary The system could be made to run programs as an administrator. Software description linux-lts-vivid – Linux hardware enablement kernel from Vivid Details Nathan Williams discovered that overlayfs in the Linux kernel incorrectlyhandled setattr operations. A local unprivileged attacker could use this tocreate files with administrative permission attributes and executearbitrary code with elevated privileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 14.04 LTS: linux-image-3.19.0-43-powerpc64-emb 3.19.0-43.49~14.04.1 linux-image-3.19.0-43-lowlatency 3.19.0-43.49~14.04.1 linux-image-3.19.0-43-powerpc64-smp 3.19.0-43.49~14.04.1 linux-image-3.19.0-43-generic-lpae 3.19.0-43.49~14.04.1 linux-image-3.19.0-43-powerpc-smp 3.19.0-43.49~14.04.1 linux-image-3.19.0-43-generic 3.19.0-43.49~14.04.1 linux-image-3.19.0-43-powerpc-e500mc 3.19.0-43.49~14.04.1 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due to an unavoidable [ more… ]

No Image

USN-2858-1: Linux kernel vulnerability

2016-01-06 KENNETH 0

Ubuntu Security Notice USN-2858-1 5th January, 2016 linux vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 15.10 Summary The system could be made to run programs as an administrator. Software description linux – Linux kernel Details Nathan Williams discovered that overlayfs in the Linux kernel incorrectlyhandled setattr operations. A local unprivileged attacker could use this tocreate files with administrative permission attributes and executearbitrary code with elevated privileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 15.10: linux-image-4.2.0-23-powerpc64-emb 4.2.0-23.28 linux-image-4.2.0-23-lowlatency 4.2.0-23.28 linux-image-4.2.0-23-powerpc64-smp 4.2.0-23.28 linux-image-4.2.0-23-generic 4.2.0-23.28 linux-image-4.2.0-23-powerpc-smp 4.2.0-23.28 linux-image-4.2.0-23-generic-lpae 4.2.0-23.28 linux-image-4.2.0-23-powerpc-e500mc 4.2.0-23.28 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates havebeen [ more… ]

No Image

USN-2858-2: Linux kernel (Wily HWE) vulnerability

2016-01-06 KENNETH 0

Ubuntu Security Notice USN-2858-2 5th January, 2016 linux-lts-wily vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 14.04 LTS Summary The system could be made to run programs as an administrator. Software description linux-lts-wily – Linux hardware enablement kernel from Wily Details Nathan Williams discovered that overlayfs in the Linux kernel incorrectlyhandled setattr operations. A local unprivileged attacker could use this tocreate files with administrative permission attributes and executearbitrary code with elevated privileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 14.04 LTS: linux-image-4.2.0-23-powerpc64-emb 4.2.0-23.28~14.04.1 linux-image-4.2.0-23-lowlatency 4.2.0-23.28~14.04.1 linux-image-4.2.0-23-powerpc64-smp 4.2.0-23.28~14.04.1 linux-image-4.2.0-23-generic 4.2.0-23.28~14.04.1 linux-image-4.2.0-23-powerpc-smp 4.2.0-23.28~14.04.1 linux-image-4.2.0-23-generic-lpae 4.2.0-23.28~14.04.1 linux-image-4.2.0-23-powerpc-e500mc 4.2.0-23.28~14.04.1 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due to an unavoidable [ more… ]

No Image

USN-2858-3: Linux kernel (Raspberry Pi 2) vulnerability

2016-01-06 KENNETH 0

Ubuntu Security Notice USN-2858-3 5th January, 2016 linux-raspi2 vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 15.10 Summary The system could be made to run programs as an administrator. Software description linux-raspi2 – Linux kernel for Raspberry Pi 2 Details Nathan Williams discovered that overlayfs in the Linux kernel incorrectlyhandled setattr operations. A local unprivileged attacker could use this tocreate files with administrative permission attributes and executearbitrary code with elevated privileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 15.10: linux-image-4.2.0-1018-raspi2 4.2.0-1018.25 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates havebeen given a new version number, which requires you [ more… ]