No Image

USN-3218-1: Linux kernel vulnerability

2017-03-08 KENNETH 0

USN-3218-1: Linux kernel vulnerability Ubuntu Security Notice USN-3218-1 7th March, 2017 linux, linux-ti-omap4 vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 12.04 LTS Summary The system could be made to crash or run programs as an administrator. Software description linux – Linux kernel linux-ti-omap4 – Linux kernel for OMAP4 Details Alexander Popov discovered that the N_HDLC line discipline implementationin the Linux kernel contained a double-free vulnerability. A local attackercould use this to cause a denial of service (system crash) or possibly gainadministrative privileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 12.04 LTS: linux-image-omap4 3.2.0.1502.97 linux-image-3.2.0-124-virtual 3.2.0-124.167 linux-image-generic 3.2.0.124.139 linux-image-powerpc-smp 3.2.0.124.139 linux-image-generic-pae 3.2.0.124.139 linux-image-3.2.0-124-generic-pae 3.2.0-124.167 linux-image-highbank 3.2.0.124.139 linux-image-virtual 3.2.0.124.139 linux-image-3.2.0-124-omap 3.2.0-124.167 linux-image-powerpc64-smp 3.2.0.124.139 linux-image-3.2.0-124-highbank 3.2.0-124.167 linux-image-3.2.0-124-generic 3.2.0-124.167 linux-image-3.2.0-1502-omap4 3.2.0-1502.129 linux-image-omap 3.2.0.124.139 linux-image-3.2.0-124-powerpc-smp 3.2.0-124.167 linux-image-3.2.0-124-powerpc64-smp 3.2.0-124.167 To [ more… ]

No Image

USN-3219-1: Linux kernel vulnerability

2017-03-08 KENNETH 0

USN-3219-1: Linux kernel vulnerability Ubuntu Security Notice USN-3219-1 7th March, 2017 linux vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 14.04 LTS Summary The system could be made to crash or run programs as an administrator. Software description linux – Linux kernel Details Alexander Popov discovered that the N_HDLC line discipline implementationin the Linux kernel contained a double-free vulnerability. A local attackercould use this to cause a denial of service (system crash) or possibly gainadministrative privileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 14.04 LTS: linux-image-powerpc-smp 3.13.0.112.120 linux-image-3.13.0-112-powerpc-e500 3.13.0-112.159 linux-image-3.13.0-112-powerpc-smp 3.13.0-112.159 linux-image-generic 3.13.0.112.120 linux-image-3.13.0-112-powerpc-e500mc 3.13.0-112.159 linux-image-powerpc-e500mc 3.13.0.112.120 linux-image-generic-lpae 3.13.0.112.120 linux-image-3.13.0-112-powerpc64-smp 3.13.0-112.159 linux-image-powerpc-e500 3.13.0.112.120 linux-image-3.13.0-112-generic-lpae 3.13.0-112.159 linux-image-3.13.0-112-lowlatency 3.13.0-112.159 linux-image-lowlatency 3.13.0.112.120 linux-image-3.13.0-112-generic 3.13.0-112.159 linux-image-3.13.0-112-powerpc64-emb 3.13.0-112.159 linux-image-powerpc64-emb 3.13.0.112.120 linux-image-powerpc64-smp 3.13.0.112.120 To update your system, please follow these instructions: [ more… ]

No Image

USN-3219-2: Linux kernel (Trusty HWE) vulnerability

2017-03-08 KENNETH 0

USN-3219-2: Linux kernel (Trusty HWE) vulnerability Ubuntu Security Notice USN-3219-2 7th March, 2017 linux-lts-trusty vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 12.04 LTS Summary The system could be made to crash or run programs as an administrator. Software description linux-lts-trusty – Linux hardware enablement kernel from Trusty for Precise Details USN-3219-1 fixed vulnerabilities in the Linux kernel for Ubuntu 14.04LTS. This update provides the corresponding updates for the LinuxHardware Enablement (HWE) kernel from Ubuntu 14.04 LTS for Ubuntu12.04 LTS. Alexander Popov discovered that the N_HDLC line discipline implementationin the Linux kernel contained a double-free vulnerability. A local attackercould use this to cause a denial of service (system crash) or possibly gainadministrative privileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 12.04 LTS: linux-image-generic-lpae-lts-trusty 3.13.0.112.103 linux-image-3.13.0-112-generic-lpae [ more… ]

No Image

USN-3220-2: Linux kernel (Xenial HWE) vulnerability

2017-03-08 KENNETH 0

USN-3220-2: Linux kernel (Xenial HWE) vulnerability Ubuntu Security Notice USN-3220-2 7th March, 2017 linux-lts-xenial vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 14.04 LTS Summary The system could be made to crash or run programs as an administrator. Software description linux-lts-xenial – Linux hardware enablement kernel from Xenial for Trusty Details USN-3220-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04LTS. This update provides the corresponding updates for the LinuxHardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu14.04 LTS. Alexander Popov discovered that the N_HDLC line discipline implementationin the Linux kernel contained a double-free vulnerability. A local attackercould use this to cause a denial of service (system crash) or possibly gainadministrative privileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 14.04 LTS: linux-image-powerpc-smp-lts-xenial 4.4.0.66.52 linux-image-generic-lpae-lts-xenial [ more… ]

No Image

USN-3220-1: Linux kernel vulnerability

2017-03-08 KENNETH 0

USN-3220-1: Linux kernel vulnerability Ubuntu Security Notice USN-3220-1 7th March, 2017 linux, linux-gke, linux-raspi2, linux-snapdragon vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 16.04 LTS Summary The system could be made to crash or run programs as an administrator. Software description linux – Linux kernel linux-gke – Linux Kernel for Google Container Engine (GKE) systems linux-raspi2 – Linux kernel for Raspberry Pi 2 linux-snapdragon – Linux kernel for Snapdragon Processors Details Alexander Popov discovered that the N_HDLC line discipline implementationin the Linux kernel contained a double-free vulnerability. A local attackercould use this to cause a denial of service (system crash) or possibly gainadministrative privileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 16.04 LTS: linux-image-gke 4.4.0.1005.5 linux-image-4.4.0-1005-gke 4.4.0-1005.6 linux-image-raspi2 4.4.0.1046.45 linux-image-4.4.0-66-powerpc64-emb 4.4.0-66.87 linux-image-4.4.0-66-generic 4.4.0-66.87 linux-image-powerpc-smp 4.4.0.66.70 [ more… ]