No Image

USN-3106-1: Linux kernel vulnerability

2016-10-20 KENNETH 0

USN-3106-1: Linux kernel vulnerability Ubuntu Security Notice USN-3106-1 19th October, 2016 linux vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 16.04 LTS Summary The system could be made to run programs as an administrator. Software description linux – Linux kernel Details It was discovered that a race condition existed in the memory manager ofthe Linux kernel when handling copy-on-write breakage of private read-onlymemory mappings. A local attacker could use this to gain administrativeprivileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 16.04 LTS: linux-image-4.4.0-45-powerpc64-emb 4.4.0-45.66 linux-image-4.4.0-45-powerpc-smp 4.4.0-45.66 linux-image-4.4.0-45-lowlatency 4.4.0-45.66 linux-image-4.4.0-45-generic 4.4.0-45.66 linux-image-4.4.0-45-generic-lpae 4.4.0-45.66 linux-image-4.4.0-45-powerpc-e500mc 4.4.0-45.66 linux-image-4.4.0-45-powerpc64-smp 4.4.0-45.66 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due to an [ more… ]

No Image

USN-3105-1: Linux kernel vulnerability

2016-10-20 KENNETH 0

USN-3105-1: Linux kernel vulnerability Ubuntu Security Notice USN-3105-1 19th October, 2016 linux vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 14.04 LTS Summary The system could be made to run programs as an administrator. Software description linux – Linux kernel Details It was discovered that a race condition existed in the memory manager ofthe Linux kernel when handling copy-on-write breakage of private read-onlymemory mappings. A local attacker could use this to gain administrativeprivileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 14.04 LTS: linux-image-3.13.0-100-generic 3.13.0-100.147 linux-image-3.13.0-100-powerpc-e500 3.13.0-100.147 linux-image-3.13.0-100-generic-lpae 3.13.0-100.147 linux-image-3.13.0-100-powerpc-smp 3.13.0-100.147 linux-image-3.13.0-100-powerpc64-smp 3.13.0-100.147 linux-image-3.13.0-100-powerpc64-emb 3.13.0-100.147 linux-image-3.13.0-100-powerpc-e500mc 3.13.0-100.147 linux-image-3.13.0-100-lowlatency 3.13.0-100.147 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due [ more… ]

No Image

USN-3104-1: Linux kernel vulnerability

2016-10-20 KENNETH 0

USN-3104-1: Linux kernel vulnerability Ubuntu Security Notice USN-3104-1 19th October, 2016 linux vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 12.04 LTS Summary The system could be made to run programs as an administrator. Software description linux – Linux kernel Details It was discovered that a race condition existed in the memory manager ofthe Linux kernel when handling copy-on-write breakage of private read-onlymemory mappings. A local attacker could use this to gain administrativeprivileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 12.04 LTS: linux-image-3.2.0-113-powerpc64-smp 3.2.0-113.155 linux-image-3.2.0-113-powerpc-smp 3.2.0-113.155 linux-image-3.2.0-113-generic-pae 3.2.0-113.155 linux-image-3.2.0-113-virtual 3.2.0-113.155 linux-image-3.2.0-113-generic 3.2.0-113.155 linux-image-3.2.0-113-omap 3.2.0-113.155 linux-image-3.2.0-113-highbank 3.2.0-113.155 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due to an [ more… ]

No Image

USN-3106-4: Linux kernel (Qualcomm Snapdragon) vulnerability

2016-10-20 KENNETH 0

USN-3106-4: Linux kernel (Qualcomm Snapdragon) vulnerability Ubuntu Security Notice USN-3106-4 19th October, 2016 linux-snapdragon vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 16.04 LTS Summary The system could be made to run programs as an administrator. Software description linux-snapdragon – Linux kernel for Snapdragon Processors Details It was discovered that a race condition existed in the memory manager ofthe Linux kernel when handling copy-on-write breakage of private read-onlymemory mappings. A local attacker could use this to gain administrativeprivileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 16.04 LTS: linux-image-4.4.0-1032-snapdragon 4.4.0-1032.36 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates havebeen [ more… ]

No Image

USN-3097-2: Linux kernel (OMAP4) vulnerabilities

2016-10-14 KENNETH 0

USN-3097-2: Linux kernel (OMAP4) vulnerabilities Ubuntu Security Notice USN-3097-2 13th October, 2016 linux-ti-omap4 vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 12.04 LTS Summary Several security issues were fixed in the kernel. Software description linux-ti-omap4 – Linux kernel for OMAP4 Details Marco Grassi discovered a use-after-free condition could occur in the TCPretransmit queue handling code in the Linux kernel. A local attacker coulduse this to cause a denial of service (system crash) or possibly executearbitrary code. (CVE-2016-6828) Pengfei Wang discovered a race condition in the audit subsystem in theLinux kernel. A local attacker could use this to corrupt audit logs ordisrupt system-call auditing. (CVE-2016-6136) Pengfei Wang discovered a race condition in the Adaptec AAC RAID controllerdriver in the Linux kernel when handling ioctl()s. A local attacker coulduse this to cause a denial of service (system [ more… ]