No Image

USN-3082-2: Linux kernel (OMAP4) vulnerability

2016-09-20 KENNETH 0

USN-3082-2: Linux kernel (OMAP4) vulnerability Ubuntu Security Notice USN-3082-2 19th September, 2016 linux-ti-omap4 vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 12.04 LTS Summary The system could be made to run programs as an administrator. Software description linux-ti-omap4 – Linux kernel for OMAP4 Details Chiachih Wu, Yuan-Tsung Lo, and Xuxian Jiang discovered that the legacy ABIfor ARM (OABI) had incomplete access checks for epoll_wait(2) andsemtimedop(2). A local attacker could use this to possibly executearbitrary code. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 12.04 LTS: linux-image-3.2.0-1488-omap4 3.2.0-1488.115 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates havebeen given a new [ more… ]

No Image

USN-3082-1: Linux kernel vulnerability

2016-09-20 KENNETH 0

USN-3082-1: Linux kernel vulnerability Ubuntu Security Notice USN-3082-1 19th September, 2016 linux vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 12.04 LTS Summary The system could be made to run programs as an administrator. Software description linux – Linux kernel Details Chiachih Wu, Yuan-Tsung Lo, and Xuxian Jiang discovered that the legacy ABIfor ARM (OABI) had incomplete access checks for epoll_wait(2) andsemtimedop(2). A local attacker could use this to possibly executearbitrary code. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 12.04 LTS: linux-image-3.2.0-110-generic 3.2.0-110.151 linux-image-3.2.0-110-omap 3.2.0-110.151 linux-image-3.2.0-110-powerpc-smp 3.2.0-110.151 linux-image-3.2.0-110-highbank 3.2.0-110.151 linux-image-3.2.0-110-powerpc64-smp 3.2.0-110.151 linux-image-3.2.0-110-virtual 3.2.0-110.151 linux-image-3.2.0-110-generic-pae 3.2.0-110.151 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due to an unavoidable [ more… ]

No Image

USN-3084-4: Linux kernel (Qualcomm Snapdragon) vulnerabilities

2016-09-20 KENNETH 0

USN-3084-4: Linux kernel (Qualcomm Snapdragon) vulnerabilities Ubuntu Security Notice USN-3084-4 19th September, 2016 linux-snapdragon vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 16.04 LTS Summary Several security issues were fixed in the kernel. Software description linux-snapdragon – Linux kernel for Snapdragon Processors Details Pengfei Wang discovered a race condition in the audit subsystem in theLinux kernel. A local attacker could use this to corrupt audit logs ordisrupt system-call auditing. (CVE-2016-6136) It was discovered that the powerpc and powerpc64 hypervisor-mode KVMimplementation in the Linux kernel for did not properly maintain stateabout transactional memory. An unprivileged attacker in a guest could causea denial of service (CPU lockup) in the host OS. (CVE-2016-5412) Pengfei Wang discovered a race condition in the Chrome OS embeddedcontroller device driver in the Linux kernel. A local attacker could usethis to cause a [ more… ]

No Image

USN-3084-3: Linux kernel (Raspberry Pi 2) vulnerabilities

2016-09-20 KENNETH 0

USN-3084-3: Linux kernel (Raspberry Pi 2) vulnerabilities Ubuntu Security Notice USN-3084-3 19th September, 2016 linux-raspi2 vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 16.04 LTS Summary Several security issues were fixed in the kernel. Software description linux-raspi2 – Linux kernel for Raspberry Pi 2 Details Pengfei Wang discovered a race condition in the audit subsystem in theLinux kernel. A local attacker could use this to corrupt audit logs ordisrupt system-call auditing. (CVE-2016-6136) It was discovered that the powerpc and powerpc64 hypervisor-mode KVMimplementation in the Linux kernel for did not properly maintain stateabout transactional memory. An unprivileged attacker in a guest could causea denial of service (CPU lockup) in the host OS. (CVE-2016-5412) Pengfei Wang discovered a race condition in the Chrome OS embeddedcontroller device driver in the Linux kernel. A local attacker could usethis to [ more… ]

No Image

USN-3084-2: Linux kernel (Xenial HWE) vulnerabilities

2016-09-20 KENNETH 0

USN-3084-2: Linux kernel (Xenial HWE) vulnerabilities Ubuntu Security Notice USN-3084-2 19th September, 2016 linux-lts-xenial vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 14.04 LTS Summary Several security issues were fixed in the kernel. Software description linux-lts-xenial – Linux hardware enablement kernel from Xenial for Trusty Details USN-3084-1 fixed vulnerabilities in the Linux kernel for Ubuntu16.04 LTS. This update provides the corresponding updates for theLinux Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS forUbuntu 14.04 LTS. Pengfei Wang discovered a race condition in the audit subsystem in theLinux kernel. A local attacker could use this to corrupt audit logs ordisrupt system-call auditing. (CVE-2016-6136) It was discovered that the powerpc and powerpc64 hypervisor-mode KVMimplementation in the Linux kernel for did not properly maintain stateabout transactional memory. An unprivileged attacker in a guest could causea denial of service [ more… ]