No Image

USN-3149-2: Linux kernel (Trusty HWE) vulnerability

2016-12-06 KENNETH 0

USN-3149-2: Linux kernel (Trusty HWE) vulnerability Ubuntu Security Notice USN-3149-2 5th December, 2016 linux-lts-trusty vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 12.04 LTS Summary The system could be made to run programs as an administrator. Software description linux-lts-trusty – Linux hardware enablement kernel from Trusty for Precise Details USN-3149-1 fixed vulnerabilities in the Linux kernel for Ubuntu 14.04LTS. This update provides the corresponding updates for the LinuxHardware Enablement (HWE) kernel from Ubuntu 14.04 LTS for Ubuntu12.04 LTS. Philip Pettersson discovered a race condition in the af_packetimplementation in the Linux kernel. A local unprivileged attacker could usethis to cause a denial of service (system crash) or run arbitrary code withadministrative privileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 12.04 LTS: linux-image-generic-lpae-lts-trusty 3.13.0.105.96 linux-image-3.13.0-105-generic 3.13.0-105.152~precise1 linux-image-generic-lts-trusty [ more… ]

No Image

USN-3150-1: Linux kernel vulnerability

2016-12-06 KENNETH 0

USN-3150-1: Linux kernel vulnerability Ubuntu Security Notice USN-3150-1 5th December, 2016 linux vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 12.04 LTS Summary The system could be made to crash or run programs as an administrator. Software description linux – Linux kernel Details Philip Pettersson discovered a race condition in the af_packetimplementation in the Linux kernel. A local unprivileged attacker could usethis to cause a denial of service (system crash) or run arbitrary code withadministrative privileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 12.04 LTS: linux-image-3.2.0-118-powerpc-smp 3.2.0-118.161 linux-image-powerpc-smp 3.2.0.118.133 linux-image-3.2.0-118-highbank 3.2.0-118.161 linux-image-3.2.0-118-powerpc64-smp 3.2.0-118.161 linux-image-3.2.0-118-virtual 3.2.0-118.161 linux-image-3.2.0-118-generic-pae 3.2.0-118.161 linux-image-3.2.0-118-generic 3.2.0-118.161 linux-image-generic-pae 3.2.0.118.133 linux-image-highbank 3.2.0.118.133 linux-image-3.2.0-118-omap 3.2.0-118.161 linux-image-virtual 3.2.0.118.133 linux-image-powerpc64-smp 3.2.0.118.133 linux-image-generic 3.2.0.118.133 linux-image-omap 3.2.0.118.133 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard [ more… ]

No Image

USN-3151-1: Linux kernel vulnerability

2016-12-06 KENNETH 0

USN-3151-1: Linux kernel vulnerability Ubuntu Security Notice USN-3151-1 5th December, 2016 linux vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 16.04 LTS Summary The system could be made to crash or run programs as an administrator. Software description linux – Linux kernel Details Philip Pettersson discovered a race condition in the af_packetimplementation in the Linux kernel. A local unprivileged attacker could usethis to cause a denial of service (system crash) or run arbitrary code withadministrative privileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 16.04 LTS: linux-image-powerpc-smp 4.4.0.53.56 linux-image-4.4.0-53-generic 4.4.0-53.74 linux-image-4.4.0-53-generic-lpae 4.4.0-53.74 linux-image-generic 4.4.0.53.56 linux-image-powerpc-e500mc 4.4.0.53.56 linux-image-lowlatency 4.4.0.53.56 linux-image-4.4.0-53-lowlatency 4.4.0-53.74 linux-image-4.4.0-53-powerpc-smp 4.4.0-53.74 linux-image-powerpc64-smp 4.4.0.53.56 linux-image-generic-lpae 4.4.0.53.56 linux-image-4.4.0-53-powerpc64-emb 4.4.0-53.74 linux-image-4.4.0-53-powerpc64-smp 4.4.0-53.74 linux-image-powerpc64-emb 4.4.0.53.56 linux-image-4.4.0-53-powerpc-e500mc 4.4.0-53.74 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard [ more… ]

No Image

USN-3151-2: Linux kernel (Xenial HWE) vulnerability

2016-12-06 KENNETH 0

USN-3151-2: Linux kernel (Xenial HWE) vulnerability Ubuntu Security Notice USN-3151-2 5th December, 2016 linux-lts-xenial vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 14.04 LTS Summary The system could be made to crash or run programs as an administrator. Software description linux-lts-xenial – Linux hardware enablement kernel from Xenial for Trusty Details USN-3151-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04LTS. This update provides the corresponding updates for the LinuxHardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu14.04 LTS. Philip Pettersson discovered a race condition in the af_packetimplementation in the Linux kernel. A local unprivileged attacker could usethis to cause a denial of service (system crash) or run arbitrary code withadministrative privileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 14.04 LTS: linux-image-powerpc-smp-lts-xenial 4.4.0.53.40 linux-image-generic-lpae-lts-xenial [ more… ]

No Image

USN-3152-1: Linux kernel vulnerability

2016-12-06 KENNETH 0

USN-3152-1: Linux kernel vulnerability Ubuntu Security Notice USN-3152-1 5th December, 2016 linux vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 16.10 Summary The system could be made to crash or run programs as an administrator. Software description linux – Linux kernel Details Philip Pettersson discovered a race condition in the af_packetimplementation in the Linux kernel. A local unprivileged attacker could usethis to cause a denial of service (system crash) or run arbitrary code withadministrative privileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 16.10: linux-image-powerpc-smp 4.8.0.30.39 linux-image-4.8.0-30-generic 4.8.0-30.32 linux-image-4.8.0-30-powerpc-smp 4.8.0-30.32 linux-image-4.8.0-30-powerpc-e500mc 4.8.0-30.32 linux-image-4.8.0-30-lowlatency 4.8.0-30.32 linux-image-generic 4.8.0.30.39 linux-image-4.8.0-30-generic-lpae 4.8.0-30.32 linux-image-powerpc-e500mc 4.8.0.30.39 linux-image-powerpc64-emb 4.8.0.30.39 linux-image-generic-lpae 4.8.0.30.39 linux-image-lowlatency 4.8.0.30.39 linux-image-4.8.0-30-powerpc64-emb 4.8.0-30.32 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot [ more… ]