No Image

USN-3104-1: Linux kernel vulnerability

2016-10-20 KENNETH 0

USN-3104-1: Linux kernel vulnerability Ubuntu Security Notice USN-3104-1 19th October, 2016 linux vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 12.04 LTS Summary The system could be made to run programs as an administrator. Software description linux – Linux kernel Details It was discovered that a race condition existed in the memory manager ofthe Linux kernel when handling copy-on-write breakage of private read-onlymemory mappings. A local attacker could use this to gain administrativeprivileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 12.04 LTS: linux-image-3.2.0-113-powerpc64-smp 3.2.0-113.155 linux-image-3.2.0-113-powerpc-smp 3.2.0-113.155 linux-image-3.2.0-113-generic-pae 3.2.0-113.155 linux-image-3.2.0-113-virtual 3.2.0-113.155 linux-image-3.2.0-113-generic 3.2.0-113.155 linux-image-3.2.0-113-omap 3.2.0-113.155 linux-image-3.2.0-113-highbank 3.2.0-113.155 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due to an [ more… ]

No Image

USN-3105-1: Linux kernel vulnerability

2016-10-20 KENNETH 0

USN-3105-1: Linux kernel vulnerability Ubuntu Security Notice USN-3105-1 19th October, 2016 linux vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 14.04 LTS Summary The system could be made to run programs as an administrator. Software description linux – Linux kernel Details It was discovered that a race condition existed in the memory manager ofthe Linux kernel when handling copy-on-write breakage of private read-onlymemory mappings. A local attacker could use this to gain administrativeprivileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 14.04 LTS: linux-image-3.13.0-100-generic 3.13.0-100.147 linux-image-3.13.0-100-powerpc-e500 3.13.0-100.147 linux-image-3.13.0-100-generic-lpae 3.13.0-100.147 linux-image-3.13.0-100-powerpc-smp 3.13.0-100.147 linux-image-3.13.0-100-powerpc64-smp 3.13.0-100.147 linux-image-3.13.0-100-powerpc64-emb 3.13.0-100.147 linux-image-3.13.0-100-powerpc-e500mc 3.13.0-100.147 linux-image-3.13.0-100-lowlatency 3.13.0-100.147 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due [ more… ]

No Image

USN-3106-1: Linux kernel vulnerability

2016-10-20 KENNETH 0

USN-3106-1: Linux kernel vulnerability Ubuntu Security Notice USN-3106-1 19th October, 2016 linux vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 16.04 LTS Summary The system could be made to run programs as an administrator. Software description linux – Linux kernel Details It was discovered that a race condition existed in the memory manager ofthe Linux kernel when handling copy-on-write breakage of private read-onlymemory mappings. A local attacker could use this to gain administrativeprivileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 16.04 LTS: linux-image-4.4.0-45-powerpc64-emb 4.4.0-45.66 linux-image-4.4.0-45-powerpc-smp 4.4.0-45.66 linux-image-4.4.0-45-lowlatency 4.4.0-45.66 linux-image-4.4.0-45-generic 4.4.0-45.66 linux-image-4.4.0-45-generic-lpae 4.4.0-45.66 linux-image-4.4.0-45-powerpc-e500mc 4.4.0-45.66 linux-image-4.4.0-45-powerpc64-smp 4.4.0-45.66 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due to an [ more… ]

No Image

USN-3107-1: Linux kernel vulnerability

2016-10-20 KENNETH 0

USN-3107-1: Linux kernel vulnerability Ubuntu Security Notice USN-3107-1 19th October, 2016 linux vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 16.10 Summary The system could be made to run programs as an administrator. Software description linux – Linux kernel Details It was discovered that a race condition existed in the memory manager ofthe Linux kernel when handling copy-on-write breakage of private read-onlymemory mappings. A local attacker could use this to gain administrativeprivileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 16.10: linux-image-4.8.0-26-powerpc64-emb 4.8.0-26.28 linux-image-4.8.0-26-generic 4.8.0-26.28 linux-image-4.8.0-26-generic-lpae 4.8.0-26.28 linux-image-4.8.0-26-lowlatency 4.8.0-26.28 linux-image-4.8.0-26-powerpc-smp 4.8.0-26.28 linux-image-4.8.0-26-powerpc-e500mc 4.8.0-26.28 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due to an unavoidable ABI change the [ more… ]

No Image

USN-3105-2: Linux kernel (Trusty HWE) vulnerability

2016-10-20 KENNETH 0

USN-3105-2: Linux kernel (Trusty HWE) vulnerability Ubuntu Security Notice USN-3105-2 19th October, 2016 linux-lts-trusty vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 12.04 LTS Summary The system could be made to run programs as an administrator. Software description linux-lts-trusty – Linux hardware enablement kernel from Trusty for Precise Details USN-3105-1 fixed vulnerabilities in the Linux kernel for Ubuntu 14.04LTS. This update provides the corresponding updates for the LinuxHardware Enablement (HWE) kernel from Ubuntu 14.04 LTS for Ubuntu12.04 LTS. It was discovered that a race condition existed in the memory manager ofthe Linux kernel when handling copy-on-write breakage of private read-onlymemory mappings. A local attacker could use this to gain administrativeprivileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 12.04 LTS: linux-image-3.13.0-100-generic-lpae 3.13.0-100.147~precise1 linux-image-3.13.0-100-generic 3.13.0-100.147~precise1 To update [ more… ]