No Image

USN-3107-1: Linux kernel vulnerability

2016-10-20 KENNETH 0

USN-3107-1: Linux kernel vulnerability Ubuntu Security Notice USN-3107-1 19th October, 2016 linux vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 16.10 Summary The system could be made to run programs as an administrator. Software description linux – Linux kernel Details It was discovered that a race condition existed in the memory manager ofthe Linux kernel when handling copy-on-write breakage of private read-onlymemory mappings. A local attacker could use this to gain administrativeprivileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 16.10: linux-image-4.8.0-26-powerpc64-emb 4.8.0-26.28 linux-image-4.8.0-26-generic 4.8.0-26.28 linux-image-4.8.0-26-generic-lpae 4.8.0-26.28 linux-image-4.8.0-26-lowlatency 4.8.0-26.28 linux-image-4.8.0-26-powerpc-smp 4.8.0-26.28 linux-image-4.8.0-26-powerpc-e500mc 4.8.0-26.28 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due to an unavoidable ABI change the [ more… ]

No Image

USN-3106-1: Linux kernel vulnerability

2016-10-20 KENNETH 0

USN-3106-1: Linux kernel vulnerability Ubuntu Security Notice USN-3106-1 19th October, 2016 linux vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 16.04 LTS Summary The system could be made to run programs as an administrator. Software description linux – Linux kernel Details It was discovered that a race condition existed in the memory manager ofthe Linux kernel when handling copy-on-write breakage of private read-onlymemory mappings. A local attacker could use this to gain administrativeprivileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 16.04 LTS: linux-image-4.4.0-45-powerpc64-emb 4.4.0-45.66 linux-image-4.4.0-45-powerpc-smp 4.4.0-45.66 linux-image-4.4.0-45-lowlatency 4.4.0-45.66 linux-image-4.4.0-45-generic 4.4.0-45.66 linux-image-4.4.0-45-generic-lpae 4.4.0-45.66 linux-image-4.4.0-45-powerpc-e500mc 4.4.0-45.66 linux-image-4.4.0-45-powerpc64-smp 4.4.0-45.66 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due to an [ more… ]

No Image

USN-3105-1: Linux kernel vulnerability

2016-10-20 KENNETH 0

USN-3105-1: Linux kernel vulnerability Ubuntu Security Notice USN-3105-1 19th October, 2016 linux vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 14.04 LTS Summary The system could be made to run programs as an administrator. Software description linux – Linux kernel Details It was discovered that a race condition existed in the memory manager ofthe Linux kernel when handling copy-on-write breakage of private read-onlymemory mappings. A local attacker could use this to gain administrativeprivileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 14.04 LTS: linux-image-3.13.0-100-generic 3.13.0-100.147 linux-image-3.13.0-100-powerpc-e500 3.13.0-100.147 linux-image-3.13.0-100-generic-lpae 3.13.0-100.147 linux-image-3.13.0-100-powerpc-smp 3.13.0-100.147 linux-image-3.13.0-100-powerpc64-smp 3.13.0-100.147 linux-image-3.13.0-100-powerpc64-emb 3.13.0-100.147 linux-image-3.13.0-100-powerpc-e500mc 3.13.0-100.147 linux-image-3.13.0-100-lowlatency 3.13.0-100.147 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due [ more… ]

No Image

USN-3104-1: Linux kernel vulnerability

2016-10-20 KENNETH 0

USN-3104-1: Linux kernel vulnerability Ubuntu Security Notice USN-3104-1 19th October, 2016 linux vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 12.04 LTS Summary The system could be made to run programs as an administrator. Software description linux – Linux kernel Details It was discovered that a race condition existed in the memory manager ofthe Linux kernel when handling copy-on-write breakage of private read-onlymemory mappings. A local attacker could use this to gain administrativeprivileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 12.04 LTS: linux-image-3.2.0-113-powerpc64-smp 3.2.0-113.155 linux-image-3.2.0-113-powerpc-smp 3.2.0-113.155 linux-image-3.2.0-113-generic-pae 3.2.0-113.155 linux-image-3.2.0-113-virtual 3.2.0-113.155 linux-image-3.2.0-113-generic 3.2.0-113.155 linux-image-3.2.0-113-omap 3.2.0-113.155 linux-image-3.2.0-113-highbank 3.2.0-113.155 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due to an [ more… ]

No Image

USN-3106-4: Linux kernel (Qualcomm Snapdragon) vulnerability

2016-10-20 KENNETH 0

USN-3106-4: Linux kernel (Qualcomm Snapdragon) vulnerability Ubuntu Security Notice USN-3106-4 19th October, 2016 linux-snapdragon vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 16.04 LTS Summary The system could be made to run programs as an administrator. Software description linux-snapdragon – Linux kernel for Snapdragon Processors Details It was discovered that a race condition existed in the memory manager ofthe Linux kernel when handling copy-on-write breakage of private read-onlymemory mappings. A local attacker could use this to gain administrativeprivileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 16.04 LTS: linux-image-4.4.0-1032-snapdragon 4.4.0-1032.36 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates havebeen [ more… ]