==========================================================================
Ubuntu Security Notice USN-2619-1
May 23, 2015
linux-lts-trusty vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 12.04 LTS
Summary:
The system could be made to crash under certain conditions.
Software Description:
– linux-lts-trusty: Linux hardware enablement kernel from Trusty
Details:
A flaw was discovered in the Linux kernel’s IPv4 networking when using TCP
fast open to initiate a connection. An unprivileged local user could
exploit this flaw to cause a denial of service (system crash).
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.13.0-53-generic 3.13.0-53.89~precise1
linux-image-3.13.0-53-generic-lpae 3.13.0-53.89~precise1
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2619-1
CVE-2015-3332
Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-trusty/3.13.0-53.89~precise1
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=xCDI
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-2620-1
May 23, 2015
linux vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 14.04 LTS
Summary:
The system could be made to crash under certain conditions.
Software Description:
– linux: Linux kernel
Details:
A flaw was discovered in the Linux kernel’s IPv4 networking when using TCP
fast open to initiate a connection. An unprivileged local user could
exploit this flaw to cause a denial of service (system crash).
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
linux-image-3.13.0-53-generic 3.13.0-53.89
linux-image-3.13.0-53-generic-lpae 3.13.0-53.89
linux-image-3.13.0-53-lowlatency 3.13.0-53.89
linux-image-3.13.0-53-powerpc-e500 3.13.0-53.89
linux-image-3.13.0-53-powerpc-e500mc 3.13.0-53.89
linux-image-3.13.0-53-powerpc-smp 3.13.0-53.89
linux-image-3.13.0-53-powerpc64-emb 3.13.0-53.89
linux-image-3.13.0-53-powerpc64-smp 3.13.0-53.89
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2620-1
CVE-2015-3332
Package Information:
https://launchpad.net/ubuntu/+source/linux/3.13.0-53.89
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=YEUI
—–END PGP SIGNATURE—–
—