==========================================================================
Ubuntu Security Notice USN-2196-1
May 06, 2014
linux vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 10.04 LTS
Summary:
The system could be made to crash or run programs as an administrator.
Software Description:
– linux: Linux kernel
Details:
A flaw was discovered in the Linux kernel’s pseudo tty (pty) device. An
unprivileged user could exploit this flaw to cause a denial of service
(system crash) or potentially gain administrator privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 10.04 LTS:
linux-image-2.6.32-58-386 2.6.32-58.121
linux-image-2.6.32-58-generic 2.6.32-58.121
linux-image-2.6.32-58-generic-pae 2.6.32-58.121
linux-image-2.6.32-58-ia64 2.6.32-58.121
linux-image-2.6.32-58-lpia 2.6.32-58.121
linux-image-2.6.32-58-powerpc 2.6.32-58.121
linux-image-2.6.32-58-powerpc-smp 2.6.32-58.121
linux-image-2.6.32-58-powerpc64-smp 2.6.32-58.121
linux-image-2.6.32-58-preempt 2.6.32-58.121
linux-image-2.6.32-58-server 2.6.32-58.121
linux-image-2.6.32-58-sparc64 2.6.32-58.121
linux-image-2.6.32-58-sparc64-smp 2.6.32-58.121
linux-image-2.6.32-58-versatile 2.6.32-58.121
linux-image-2.6.32-58-virtual 2.6.32-58.121
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2196-1
CVE-2014-0196
Package Information:
https://launchpad.net/ubuntu/+source/linux/2.6.32-58.121
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/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=Egwo
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-2198-1
May 06, 2014
linux vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 12.04 LTS
Summary:
The system could be made to crash or run programs as an administrator.
Software Description:
– linux: Linux kernel
Details:
A flaw was discovered in the Linux kernel’s pseudo tty (pty) device. An
unprivileged user could exploit this flaw to cause a denial of service
(system crash) or potentially gain administrator privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.2.0-61-generic 3.2.0-61.93
linux-image-3.2.0-61-generic-pae 3.2.0-61.93
linux-image-3.2.0-61-highbank 3.2.0-61.93
linux-image-3.2.0-61-omap 3.2.0-61.93
linux-image-3.2.0-61-powerpc-smp 3.2.0-61.93
linux-image-3.2.0-61-powerpc64-smp 3.2.0-61.93
linux-image-3.2.0-61-virtual 3.2.0-61.93
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-2198-1
CVE-2014-0196
Package Information:
https://launchpad.net/ubuntu/+source/linux/3.2.0-61.93
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/
iQIcBAEBCgAGBQJTaE24AAoJEAUvNnAY1cPYw+IP/Rc1PBt4enw48+0miqIeUgfE
kyfDGbdZ5w059BOSVl8sYFy3P9sXCaFpYU9XuqOu5bUihRyOMW75PFUSly0aPKaa
7BFjP2CakpfuNSAjfe2JPk5Vh8rSI6hNrMRIj142AO2W5mZl86ld73XieCl5rxL9
7Ap3Gn4Jb77laT89EFShYuiv3n8rXyoHrM8ZYvRQxVOKTW14pfmi9TeIZ9J4A2oy
Ry8kuGN5VERpzX1arGehqay8HEE4EOAMDYEkoUrl9mrGv98XCogUynVMMf2Rc0/s
pq/3b7Wj1K9hy8Q0i8KmEEZXpDQZ5h1R2nx/GQzkQDCE53ps1xWTYXyUo5lbx7U2
in6lJXyU2RYm4LoVN1pAUSCVKt+ORXLrToxAKvkTiRDrxTHG4Lk2pOsVczp0LsWw
0kscEabyRW1VdNsd5AZMmbjD3wThzzHZ3ic+I2u91dcY27flUc4ZciTh1v0Lko0g
mUF7W9GEiuwGPZv05y36E1UU5+460ZRUmkwL7S6x18NZEN4QJ8HRDWVwKf/6bUw0
ACAYNlgGyjYja1mOScqcxPC15QAKBbXrIyTA4nFKdsG1gtRnT8azFC8QxFBKBI2Y
iesILWrXWs7X7GC1d/dZnVqXt/iJSkVjssh0p+E7ZiuJnxSg/PFZrbqf5f6s3UfZ
yp2JIhgiMZPUUdL30nZ9
=yNsM
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-2199-1
May 06, 2014
linux-lts-quantal vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 12.04 LTS
Summary:
The system could be made to crash or run programs as an administrator.
Software Description:
– linux-lts-quantal: Linux hardware enablement kernel from Quantal
Details:
A flaw was discovered in the Linux kernel’s pseudo tty (pty) device. An
unprivileged user could exploit this flaw to cause a denial of service
(system crash) or potentially gain administrator privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.5.0-49-generic 3.5.0-49.74~precise1
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2199-1
CVE-2014-0196
Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-quantal/3.5.0-49.74~precise1
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/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=DLeG
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-2200-1
May 06, 2014
linux-lts-raring vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 12.04 LTS
Summary:
The system could be made to crash or run programs as an administrator.
Software Description:
– linux-lts-raring: Linux hardware enablement kernel from Raring
Details:
A flaw was discovered in the Linux kernel’s pseudo tty (pty) device. An
unprivileged user could exploit this flaw to cause a denial of service
(system crash) or potentially gain administrator privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.8.0-39-generic 3.8.0-39.58~precise1
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2200-1
CVE-2014-0196
Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-raring/3.8.0-39.58~precise1
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/
iQIcBAEBCgAGBQJTaE4DAAoJEAUvNnAY1cPY0SMP/3hX6StJVM9Dew9VY2NfXxbB
ps9KtWezbS+Ny0fe3OuRf2Y6nZ9cmlklF0JgE68q/5aoGIzNcLowUI+9iGwH8Fsr
nZm/zzKHnloyRgF/IN00aEpzr5YNlYzwfqeM0YOSJv4M0uWS8MXmpq9OyZK6HROb
2ZrEX9Ybe8xKH58HnhrTGpe6iK7vQ902/9Go6VdejaCqX+tbFxcvkWKq9bSGmmEN
BqBfLKxtOiHdQ9wXTgab5JB9NvstQWVgv5I11ndD5gwWImcOYJscb6f+dnEkziIS
ADfS4kQduRAC7/gJd3/3eH/Z21wuN4TWG+XJdgEg+NZX9WAqN119Aag7r2wq7Ano
rUNfxZcz86VyWctRqLQtQsxF5omFY1938jSjNJW8srOXAoCHVPCdCG0OunL0/L3W
IB/LEL4NxaLCCsw+vsElNFtydThzGZkgx3jDfhpkYz7n9rVbSt9kxUFE15pHeIvS
k7EjyHzEyEL1ijzVBZUdBJnGwznBfx/sCDR6axrWf9YubH8RfI3UTnUAYaBLo24I
esR9xciO+PwNzYEYbNc+a3RPQgKZRD/GXY+MHf0KyFRilmAi3WwZajRk7XrRf5DY
T9B9tu/QcOtHOKhBY9J+i9Vi+c6kDMM//QoMMM30BgUQdMICNjNrYZEPzgl8vH3G
F63QksR13nbPNgYFvfoO
=kdnP
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-2201-1
May 06, 2014
linux-lts-saucy vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 12.04 LTS
Summary:
The system could be made to crash or run programs as an administrator.
Software Description:
– linux-lts-saucy: Linux hardware enablement kernel from Saucy
Details:
A flaw was discovered in the Linux kernel’s pseudo tty (pty) device. An
unprivileged user could exploit this flaw to cause a denial of service
(system crash) or potentially gain administrator privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.11.0-20-generic 3.11.0-20.35~precise1
linux-image-3.11.0-20-generic-lpae 3.11.0-20.35~precise1
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2201-1
CVE-2014-0196
Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-saucy/3.11.0-20.35~precise1
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/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=U0WY
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-2202-1
May 06, 2014
linux vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 12.10
Summary:
The system could be made to crash or run programs as an administrator.
Software Description:
– linux: Linux kernel
Details:
A flaw was discovered in the Linux kernel’s pseudo tty (pty) device. An
unprivileged user could exploit this flaw to cause a denial of service
(system crash) or potentially gain administrator privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.10:
linux-image-3.5.0-49-generic 3.5.0-49.74
linux-image-3.5.0-49-highbank 3.5.0-49.74
linux-image-3.5.0-49-omap 3.5.0-49.74
linux-image-3.5.0-49-powerpc-smp 3.5.0-49.74
linux-image-3.5.0-49-powerpc64-smp 3.5.0-49.74
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2202-1
CVE-2014-0196
Package Information:
https://launchpad.net/ubuntu/+source/linux/3.5.0-49.74
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/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=neB3
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-2203-1
May 06, 2014
linux vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 13.10
Summary:
The system could be made to crash or run programs as an administrator.
Software Description:
– linux: Linux kernel
Details:
A flaw was discovered in the Linux kernel’s pseudo tty (pty) device. An
unprivileged user could exploit this flaw to cause a denial of service
(system crash) or potentially gain administrator privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 13.10:
linux-image-3.11.0-20-generic 3.11.0-20.35
linux-image-3.11.0-20-generic-lpae 3.11.0-20.35
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2203-1
CVE-2014-0196
Package Information:
https://launchpad.net/ubuntu/+source/linux/3.11.0-20.35
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/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=dH2P
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-2204-1
May 06, 2014
linux vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 14.04 LTS
Summary:
The system could be made to crash or run programs as an administrator.
Software Description:
– linux: Linux kernel
Details:
A flaw was discovered in the Linux kernel’s pseudo tty (pty) device. An
unprivileged user could exploit this flaw to cause a denial of service
(system crash) or potentially gain administrator privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
linux-image-3.13.0-24-generic 3.13.0-24.47
linux-image-3.13.0-24-generic-lpae 3.13.0-24.47
linux-image-3.13.0-24-lowlatency 3.13.0-24.47
linux-image-3.13.0-24-powerpc-e500 3.13.0-24.47
linux-image-3.13.0-24-powerpc-e500mc 3.13.0-24.47
linux-image-3.13.0-24-powerpc-smp 3.13.0-24.47
linux-image-3.13.0-24-powerpc64-emb 3.13.0-24.47
linux-image-3.13.0-24-powerpc64-smp 3.13.0-24.47
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2204-1
CVE-2014-0196
Package Information:
https://launchpad.net/ubuntu/+source/linux/3.13.0-24.47
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/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=2hsB
—–END PGP SIGNATURE—–
—