You are here
Home > Preporuke > Ranjivost jezgre operacijskog sustava

Ranjivost jezgre operacijskog sustava

==========================================================================
Ubuntu Security Notice USN-2619-1
May 23, 2015

linux-lts-trusty vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 LTS

Summary:

The system could be made to crash under certain conditions.

Software Description:
– linux-lts-trusty: Linux hardware enablement kernel from Trusty

Details:

A flaw was discovered in the Linux kernel’s IPv4 networking when using TCP
fast open to initiate a connection. An unprivileged local user could
exploit this flaw to cause a denial of service (system crash).

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
linux-image-3.13.0-53-generic 3.13.0-53.89~precise1
linux-image-3.13.0-53-generic-lpae 3.13.0-53.89~precise1

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2619-1
CVE-2015-3332

Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-trusty/3.13.0-53.89~precise1

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=xCDI
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-2620-1
May 23, 2015

linux vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.04 LTS

Summary:

The system could be made to crash under certain conditions.

Software Description:
– linux: Linux kernel

Details:

A flaw was discovered in the Linux kernel’s IPv4 networking when using TCP
fast open to initiate a connection. An unprivileged local user could
exploit this flaw to cause a denial of service (system crash).

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
linux-image-3.13.0-53-generic 3.13.0-53.89
linux-image-3.13.0-53-generic-lpae 3.13.0-53.89
linux-image-3.13.0-53-lowlatency 3.13.0-53.89
linux-image-3.13.0-53-powerpc-e500 3.13.0-53.89
linux-image-3.13.0-53-powerpc-e500mc 3.13.0-53.89
linux-image-3.13.0-53-powerpc-smp 3.13.0-53.89
linux-image-3.13.0-53-powerpc64-emb 3.13.0-53.89
linux-image-3.13.0-53-powerpc64-smp 3.13.0-53.89

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2620-1
CVE-2015-3332

Package Information:
https://launchpad.net/ubuntu/+source/linux/3.13.0-53.89

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1

iQIcBAEBCgAGBQJVYCeTAAoJEAUvNnAY1cPY+RsQAIXYpYm33knekOodYZyO0o6d
HQtIDqCP9gLHO+xdGhMn8MJZDcn3X5C4bpeh2cgEHg7bK6M1ad5DRSVbDWn5bazu
wnzntMIxF95xQPJecasX9+LPVKtdWahtBHg/zmtmtLP7/eOdUaQLKzdO6MCBVApA
/mEt14lVFJP/gTncnLE+SZR8v7ep5643ZqGDJqefEq7nFtNOz4Rur3moT57WZaI/
R8B5njD1BHD7AfsZnehVHq3nkXancMneSdIfPruXLfv2nnvZb6orcnmaaU8iQvGE
9ZQp+n8060Pzgm+htTKpwAMCf9p294emXRyweAdCbiJ2vG4cKIt03rVOLdLvakxd
LN6ujFqNqy8VmhiCfpEdQEptjwS6ECaNru6WInWY9/ArASO26/wsVf+O+PsQlp4Z
wGG+TmtVDCC8/s/nvUw604raNJu1etJGqb5VSRPKwMHrWyUMWEjayupGbCWDA0nA
gf26ydYDMqHISpo8y4mnQo1TbDR3dLcDgvrH9YsYNNWA7K/I4/0cKM7tQxXw+NUP
7Ny/78IVGa45aTdu5ItY1FJeMSlKMd+5zpRKGLwUN2utD2cRzypqibQELSDG7HrP
biH28LM7aAVGZUKIvj4JJSKYlRxMJZYmwZ92TNmOs67WCy1qwMGk4YY0JxOLA9CY
bsOtB/LyQtSGK+HEZKmB
=YEUI
—–END PGP SIGNATURE—–

Top
More in Preporuke
Sigurnosni nedostaci programskog paketa nbd

Otkriveni su sigurnosni nedostaci u programskom paketu nbd. Otkriveni nedostaci potencijalnim napadačima omogućuju izvođenje napada uskraćivanjem usluge. Svim korisnicima savjetuje...

Close