No Image

USN-2861-1: libpng vulnerabilities

2016-01-07 KENNETH 0

Ubuntu Security Notice USN-2861-1 6th January, 2016 libpng vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 15.10 Ubuntu 15.04 Ubuntu 14.04 LTS Ubuntu 12.04 LTS Summary libpng could be made to crash or run programs as your login if it opened a specially crafted file. Software description libpng – PNG (Portable Network Graphics) file library Details It was discovered that libpng incorrectly handled certain small bit-depthvalues. If a user or automated system using libpng were tricked intoopening a specially crafted image, an attacker could exploit this to causea denial of service or execute code with the privileges of the userinvoking the program. (CVE-2015-8472) Qixue Xiao and Chen Yu discovered that libpng incorrectly handled certainmalformed images. If a user or automated system using libpng were trickedinto opening a specially crafted image, an attacker could exploit this [ more… ]

No Image

USN-2858-3: Linux kernel (Raspberry Pi 2) vulnerability

2016-01-06 KENNETH 0

Ubuntu Security Notice USN-2858-3 5th January, 2016 linux-raspi2 vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 15.10 Summary The system could be made to run programs as an administrator. Software description linux-raspi2 – Linux kernel for Raspberry Pi 2 Details Nathan Williams discovered that overlayfs in the Linux kernel incorrectlyhandled setattr operations. A local unprivileged attacker could use this tocreate files with administrative permission attributes and executearbitrary code with elevated privileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 15.10: linux-image-4.2.0-1018-raspi2 4.2.0-1018.25 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates havebeen given a new version number, which requires you [ more… ]

No Image

USN-2858-2: Linux kernel (Wily HWE) vulnerability

2016-01-06 KENNETH 0

Ubuntu Security Notice USN-2858-2 5th January, 2016 linux-lts-wily vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 14.04 LTS Summary The system could be made to run programs as an administrator. Software description linux-lts-wily – Linux hardware enablement kernel from Wily Details Nathan Williams discovered that overlayfs in the Linux kernel incorrectlyhandled setattr operations. A local unprivileged attacker could use this tocreate files with administrative permission attributes and executearbitrary code with elevated privileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 14.04 LTS: linux-image-4.2.0-23-powerpc64-emb 4.2.0-23.28~14.04.1 linux-image-4.2.0-23-lowlatency 4.2.0-23.28~14.04.1 linux-image-4.2.0-23-powerpc64-smp 4.2.0-23.28~14.04.1 linux-image-4.2.0-23-generic 4.2.0-23.28~14.04.1 linux-image-4.2.0-23-powerpc-smp 4.2.0-23.28~14.04.1 linux-image-4.2.0-23-generic-lpae 4.2.0-23.28~14.04.1 linux-image-4.2.0-23-powerpc-e500mc 4.2.0-23.28~14.04.1 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due to an unavoidable [ more… ]

No Image

USN-2858-1: Linux kernel vulnerability

2016-01-06 KENNETH 0

Ubuntu Security Notice USN-2858-1 5th January, 2016 linux vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 15.10 Summary The system could be made to run programs as an administrator. Software description linux – Linux kernel Details Nathan Williams discovered that overlayfs in the Linux kernel incorrectlyhandled setattr operations. A local unprivileged attacker could use this tocreate files with administrative permission attributes and executearbitrary code with elevated privileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 15.10: linux-image-4.2.0-23-powerpc64-emb 4.2.0-23.28 linux-image-4.2.0-23-lowlatency 4.2.0-23.28 linux-image-4.2.0-23-powerpc64-smp 4.2.0-23.28 linux-image-4.2.0-23-generic 4.2.0-23.28 linux-image-4.2.0-23-powerpc-smp 4.2.0-23.28 linux-image-4.2.0-23-generic-lpae 4.2.0-23.28 linux-image-4.2.0-23-powerpc-e500mc 4.2.0-23.28 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates havebeen [ more… ]

No Image

USN-2857-2: Linux kernel (Vivid HWE) vulnerability

2016-01-06 KENNETH 0

Ubuntu Security Notice USN-2857-2 5th January, 2016 linux-lts-vivid vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 14.04 LTS Summary The system could be made to run programs as an administrator. Software description linux-lts-vivid – Linux hardware enablement kernel from Vivid Details Nathan Williams discovered that overlayfs in the Linux kernel incorrectlyhandled setattr operations. A local unprivileged attacker could use this tocreate files with administrative permission attributes and executearbitrary code with elevated privileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 14.04 LTS: linux-image-3.19.0-43-powerpc64-emb 3.19.0-43.49~14.04.1 linux-image-3.19.0-43-lowlatency 3.19.0-43.49~14.04.1 linux-image-3.19.0-43-powerpc64-smp 3.19.0-43.49~14.04.1 linux-image-3.19.0-43-generic-lpae 3.19.0-43.49~14.04.1 linux-image-3.19.0-43-powerpc-smp 3.19.0-43.49~14.04.1 linux-image-3.19.0-43-generic 3.19.0-43.49~14.04.1 linux-image-3.19.0-43-powerpc-e500mc 3.19.0-43.49~14.04.1 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due to an unavoidable [ more… ]