==========================================================================
Ubuntu Security Notice USN-2887-1
February 02, 2016
linux vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
– linux: Linux kernel
Details:
It was discovered that a use-after-free vulnerability existed in the
AF_UNIX implementation in the Linux kernel. A local attacker could use
crafted epoll_ctl calls to cause a denial of service (system crash) or
expose sensitive information. (CVE-2013-7446)
It was discovered that the KVM implementation in the Linux kernel did not
properly restore the values of the Programmable Interrupt Timer (PIT). A
user-assisted attacker in a KVM guest could cause a denial of service in
the host (system crash). (CVE-2015-7513)
Sasha Levin discovered that the Reliable Datagram Sockets (RDS)
implementation in the Linux kernel had a race condition when checking
whether a socket was bound or not. A local attacker could use this to cause
a denial of service (system crash). (CVE-2015-7990)
It was discovered that the Btrfs implementation in the Linux kernel
incorrectly handled compressed inline extants on truncation. A local
attacker could use this to expose sensitive information. (CVE-2015-8374)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
linux-image-3.13.0-77-generic 3.13.0-77.121
linux-image-3.13.0-77-generic-lpae 3.13.0-77.121
linux-image-3.13.0-77-lowlatency 3.13.0-77.121
linux-image-3.13.0-77-powerpc-e500 3.13.0-77.121
linux-image-3.13.0-77-powerpc-e500mc 3.13.0-77.121
linux-image-3.13.0-77-powerpc-smp 3.13.0-77.121
linux-image-3.13.0-77-powerpc64-emb 3.13.0-77.121
linux-image-3.13.0-77-powerpc64-smp 3.13.0-77.121
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
http://www.ubuntu.com/usn/usn-2887-1
CVE-2013-7446, CVE-2015-7513, CVE-2015-7990, CVE-2015-8374
Package Information:
https://launchpad.net/ubuntu/+source/linux/3.13.0-77.121
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=2Wxa
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-2887-2
February 02, 2016
linux-lts-trusty vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
– linux-lts-trusty: Linux hardware enablement kernel from Trusty
Details:
It was discovered that a use-after-free vulnerability existed in the
AF_UNIX implementation in the Linux kernel. A local attacker could use
crafted epoll_ctl calls to cause a denial of service (system crash) or
expose sensitive information. (CVE-2013-7446)
It was discovered that the KVM implementation in the Linux kernel did not
properly restore the values of the Programmable Interrupt Timer (PIT). A
user-assisted attacker in a KVM guest could cause a denial of service in
the host (system crash). (CVE-2015-7513)
Sasha Levin discovered that the Reliable Datagram Sockets (RDS)
implementation in the Linux kernel had a race condition when checking
whether a socket was bound or not. A local attacker could use this to cause
a denial of service (system crash). (CVE-2015-7990)
It was discovered that the Btrfs implementation in the Linux kernel
incorrectly handled compressed inline extants on truncation. A local
attacker could use this to expose sensitive information. (CVE-2015-8374)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.13.0-77-generic 3.13.0-77.121~precise1
linux-image-3.13.0-77-generic-lpae 3.13.0-77.121~precise1
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
http://www.ubuntu.com/usn/usn-2887-2
http://www.ubuntu.com/usn/usn-2887-1
CVE-2013-7446, CVE-2015-7513, CVE-2015-7990, CVE-2015-8374
Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-trusty/3.13.0-77.121~precise1
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=zZsx
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-2889-1
February 02, 2016
linux vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 15.04
Summary:
Several security issues were fixed in the kernel.
Software Description:
– linux: Linux kernel
Details:
It was discovered that a use-after-free vulnerability existed in the
AF_UNIX implementation in the Linux kernel. A local attacker could use
crafted epoll_ctl calls to cause a denial of service (system crash) or
expose sensitive information. (CVE-2013-7446)
It was discovered that the KVM implementation in the Linux kernel did not
properly restore the values of the Programmable Interrupt Timer (PIT). A
user-assisted attacker in a KVM guest could cause a denial of service in
the host (system crash). (CVE-2015-7513)
Sasha Levin discovered that the Reliable Datagram Sockets (RDS)
implementation in the Linux kernel had a race condition when checking
whether a socket was bound or not. A local attacker could use this to cause
a denial of service (system crash). (CVE-2015-7990)
It was discovered that the Btrfs implementation in the Linux kernel
incorrectly handled compressed inline extants on truncation. A local
attacker could use this to expose sensitive information. (CVE-2015-8374)
It was discovered that the netfilter Network Address Translation (NAT)
implementation did not ensure that data structures were initialized when
handling IPv4 addresses. An attacker could use this to cause a denial of
service (system crash). (CVE-2015-8787)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 15.04:
linux-image-3.19.0-49-generic 3.19.0-49.55
linux-image-3.19.0-49-generic-lpae 3.19.0-49.55
linux-image-3.19.0-49-lowlatency 3.19.0-49.55
linux-image-3.19.0-49-powerpc-e500mc 3.19.0-49.55
linux-image-3.19.0-49-powerpc-smp 3.19.0-49.55
linux-image-3.19.0-49-powerpc64-emb 3.19.0-49.55
linux-image-3.19.0-49-powerpc64-smp 3.19.0-49.55
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
http://www.ubuntu.com/usn/usn-2889-1
CVE-2013-7446, CVE-2015-7513, CVE-2015-7990, CVE-2015-8374,
CVE-2015-8787
Package Information:
https://launchpad.net/ubuntu/+source/linux/3.19.0-49.55
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=oPvc
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-2889-2
February 02, 2016
linux-lts-vivid vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
– linux-lts-vivid: Linux hardware enablement kernel from Vivid
Details:
It was discovered that a use-after-free vulnerability existed in the
AF_UNIX implementation in the Linux kernel. A local attacker could use
crafted epoll_ctl calls to cause a denial of service (system crash) or
expose sensitive information. (CVE-2013-7446)
It was discovered that the KVM implementation in the Linux kernel did not
properly restore the values of the Programmable Interrupt Timer (PIT). A
user-assisted attacker in a KVM guest could cause a denial of service in
the host (system crash). (CVE-2015-7513)
Sasha Levin discovered that the Reliable Datagram Sockets (RDS)
implementation in the Linux kernel had a race condition when checking
whether a socket was bound or not. A local attacker could use this to cause
a denial of service (system crash). (CVE-2015-7990)
It was discovered that the Btrfs implementation in the Linux kernel
incorrectly handled compressed inline extants on truncation. A local
attacker could use this to expose sensitive information. (CVE-2015-8374)
It was discovered that the netfilter Network Address Translation (NAT)
implementation did not ensure that data structures were initialized when
handling IPv4 addresses. An attacker could use this to cause a denial of
service (system crash). (CVE-2015-8787)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
linux-image-3.19.0-49-generic 3.19.0-49.55~14.04.1
linux-image-3.19.0-49-generic-lpae 3.19.0-49.55~14.04.1
linux-image-3.19.0-49-lowlatency 3.19.0-49.55~14.04.1
linux-image-3.19.0-49-powerpc-e500mc 3.19.0-49.55~14.04.1
linux-image-3.19.0-49-powerpc-smp 3.19.0-49.55~14.04.1
linux-image-3.19.0-49-powerpc64-emb 3.19.0-49.55~14.04.1
linux-image-3.19.0-49-powerpc64-smp 3.19.0-49.55~14.04.1
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
http://www.ubuntu.com/usn/usn-2889-2
http://www.ubuntu.com/usn/usn-2889-1
CVE-2013-7446, CVE-2015-7513, CVE-2015-7990, CVE-2015-8374,
CVE-2015-8787
Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-vivid/3.19.0-49.55~14.04.1
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=7qTX
—–END PGP SIGNATURE—–
—
7e