You are here
Home > Preporuke > Ranjivost jezgre operacijskog sustava

Ranjivost jezgre operacijskog sustava

==========================================================================
Ubuntu Security Notice USN-2267-1
July 05, 2014

linux-ec2 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 10.04 LTS

Summary:

The system could be made to crash or run programs as an administrator.

Software Description:
– linux-ec2: Linux kernel for EC2

Details:

Andy Lutomirski discovered a flaw with the Linux kernel’s ptrace syscall on
x86_64 processors. An attacker could exploit this flaw to cause a denial of
service (System Crash) or potential gain administrative privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 10.04 LTS:
linux-image-2.6.32-366-ec2 2.6.32-366.81

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2267-1
CVE-2014-4699

Package Information:
https://launchpad.net/ubuntu/+source/linux-ec2/2.6.32-366.81

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/
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=WwN0
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-2274-1
July 05, 2014

linux vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.04 LTS

Summary:

The system could be made to crash or run programs as an administrator.

Software Description:
– linux: Linux kernel

Details:

Andy Lutomirski discovered a flaw with the Linux kernel’s ptrace syscall on
x86_64 processors. An attacker could exploit this flaw to cause a denial of
service (System Crash) or potential gain administrative privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
linux-image-3.13.0-30-generic 3.13.0-30.55
linux-image-3.13.0-30-generic-lpae 3.13.0-30.55
linux-image-3.13.0-30-lowlatency 3.13.0-30.55
linux-image-3.13.0-30-powerpc-e500 3.13.0-30.55
linux-image-3.13.0-30-powerpc-e500mc 3.13.0-30.55
linux-image-3.13.0-30-powerpc-smp 3.13.0-30.55
linux-image-3.13.0-30-powerpc64-emb 3.13.0-30.55
linux-image-3.13.0-30-powerpc64-smp 3.13.0-30.55

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References:
http://www.ubuntu.com/usn/usn-2274-1
CVE-2014-4699

Package Information:
https://launchpad.net/ubuntu/+source/linux/3.13.0-30.55

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/
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=a1YZ
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-2272-1
July 05, 2014

linux-lts-trusty vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 LTS

Summary:

The system could be made to crash or run programs as an administrator.

Software Description:
– linux-lts-trusty: Block storage devices (udeb)

Details:

Andy Lutomirski discovered a flaw with the Linux kernel’s ptrace syscall on
x86_64 processors. An attacker could exploit this flaw to cause a denial of
service (System Crash) or potential gain administrative privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
linux-image-3.13.0-30-generic 3.13.0-30.55~precise1
linux-image-3.13.0-30-generic-lpae 3.13.0-30.55~precise1

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2272-1
CVE-2014-4699

Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-trusty/3.13.0-30.55~precise1

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/
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=Gbvz
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-2266-1
July 05, 2014

linux vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 10.04 LTS

Summary:

The system could be made to crash or run programs as an administrator.

Software Description:
– linux: Linux kernel

Details:

Andy Lutomirski discovered a flaw with the Linux kernel’s ptrace syscall on
x86_64 processors. An attacker could exploit this flaw to cause a denial of
service (System Crash) or potential gain administrative privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 10.04 LTS:
linux-image-2.6.32-62-386 2.6.32-62.126
linux-image-2.6.32-62-generic 2.6.32-62.126
linux-image-2.6.32-62-generic-pae 2.6.32-62.126
linux-image-2.6.32-62-ia64 2.6.32-62.126
linux-image-2.6.32-62-lpia 2.6.32-62.126
linux-image-2.6.32-62-powerpc 2.6.32-62.126
linux-image-2.6.32-62-powerpc-smp 2.6.32-62.126
linux-image-2.6.32-62-powerpc64-smp 2.6.32-62.126
linux-image-2.6.32-62-preempt 2.6.32-62.126
linux-image-2.6.32-62-server 2.6.32-62.126
linux-image-2.6.32-62-sparc64 2.6.32-62.126
linux-image-2.6.32-62-sparc64-smp 2.6.32-62.126
linux-image-2.6.32-62-versatile 2.6.32-62.126
linux-image-2.6.32-62-virtual 2.6.32-62.126

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2266-1
CVE-2014-4699

Package Information:
https://launchpad.net/ubuntu/+source/linux/2.6.32-62.126

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/

iQIcBAEBCgAGBQJTuD4iAAoJEAUvNnAY1cPYXEEP/imYtkCIkLJ886V4237FW3h/
1WForcsQPXuvyxbfkfB3HFYdkify8ynpB/WRozkHY7h0JoqUt8pDqiamU1S/AvaP
ly7ipwbtP4Hf2rtl5Tz+9eNnHwH7AD+6yr8EyW/DRVfA5Dii1hJodjBINyUtLGWa
4ePX9Gi07iREHawd6xOWvh7prfmTHYHQtAsUI2uq1zi5nC1Zq2PDJ5slnucI73Lb
ZlfHjbSXNw3a4/IBiQLQ4XwlOf33RyoX72gBrPexrBkEPVT5I8tiyQtGesONirDc
gKIWYvHe+7YraIEJmT7K/sTfAjoUmKRfZ1G4C74s45GAtruEg75ryWgx2xah8Yjd
f2hOWb4LnpO0l4Mo74Itc9QUK/YAT1K0sU7MwDKmAyi0FB67nMzVXmrXR1Mq9x+6
Cp7aN084oeMGciulNDLOktZrV9zskLqdkvulEYgT04Y1t/O7CoCMP43Vp7YerizS
Q1A9QxPXGiKtzNyfa+5ozCyxpDQY+AtTOB+RI6Go4gLqplRqZynWyErdiTBvtBwb
U+wpulxgMASTIyM69asG0cGWAztsEcRK5zqopXiJwCSBV9VXpieqZCSVa9xKtd9N
EI0BQmmXWmj6LyKRNIXeEfvLQdcH5Lb7DGK2BJMmWi5gqY+Obc7Y8wEAvpDWLHrP
Bz5BwHU0hH6qNhvQCziz
=t7AU
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-2269-1
July 05, 2014

linux-lts-quantal vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 LTS

Summary:

The system could be made to crash or run programs as an administrator.

Software Description:
– linux-lts-quantal: Linux hardware enablement kernel from Quantal

Details:

Andy Lutomirski discovered a flaw with the Linux kernel’s ptrace syscall on
x86_64 processors. An attacker could exploit this flaw to cause a denial of
service (System Crash) or potential gain administrative privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
linux-image-3.5.0-52-generic 3.5.0-52.79~precise1

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2269-1
CVE-2014-4699

Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-quantal/3.5.0-52.79~precise1

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/
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=1ugX
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-2270-1
July 05, 2014

linux-lts-raring vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 LTS

Summary:

The system could be made to crash or run programs as an administrator.

Software Description:
– linux-lts-raring: Linux hardware enablement kernel from Raring

Details:

Andy Lutomirski discovered a flaw with the Linux kernel’s ptrace syscall on
x86_64 processors. An attacker could exploit this flaw to cause a denial of
service (System Crash) or potential gain administrative privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
linux-image-3.8.0-42-generic 3.8.0-42.63~precise1

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2270-1
CVE-2014-4699

Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-raring/3.8.0-42.63~precise1

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/
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=TyCU
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-2271-1
July 05, 2014

linux-lts-saucy vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 LTS

Summary:

The system could be made to crash or run programs as an administrator.

Software Description:
– linux-lts-saucy: Linux hardware enablement kernel from Saucy

Details:

Andy Lutomirski discovered a flaw with the Linux kernel’s ptrace syscall on
x86_64 processors. An attacker could exploit this flaw to cause a denial of
service (System Crash) or potential gain administrative privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
linux-image-3.11.0-24-generic 3.11.0-24.42~precise1
linux-image-3.11.0-24-generic-lpae 3.11.0-24.42~precise1

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2271-1
CVE-2014-4699

Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-saucy/3.11.0-24.42~precise1

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/
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=fVw/
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-2268-1
July 05, 2014

linux vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 LTS

Summary:

The system could be made to crash or run programs as an administrator.

Software Description:
– linux: Linux kernel

Details:

Andy Lutomirski discovered a flaw with the Linux kernel’s ptrace syscall on
x86_64 processors. An attacker could exploit this flaw to cause a denial of
service (System Crash) or potential gain administrative privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
linux-image-3.2.0-65-generic 3.2.0-65.99
linux-image-3.2.0-65-generic-pae 3.2.0-65.99
linux-image-3.2.0-65-highbank 3.2.0-65.99
linux-image-3.2.0-65-omap 3.2.0-65.99
linux-image-3.2.0-65-powerpc-smp 3.2.0-65.99
linux-image-3.2.0-65-powerpc64-smp 3.2.0-65.99
linux-image-3.2.0-65-virtual 3.2.0-65.99

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2268-1
CVE-2014-4699

Package Information:
https://launchpad.net/ubuntu/+source/linux/3.2.0-65.99

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/
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=US9L
—–END PGP SIGNATURE—–

Top
More in Preporuke
Sigurnosni nedostatak programskog paketa xalan-j2

Otkriven je sigurnosni nedostatak u programskom paketu xalan-j2 za operacijski sustav Suse. Otkriveni nedostatak potencijalnim napadačima omogućuje zaobilaženje postavljenih ograničenja...

Close