==========================================================================
Ubuntu Security Notice USN-3098-1
October 11, 2016
linux vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
– linux: Linux kernel
Details:
Vladimír Beneš discovered an unbounded recursion in the VLAN and TEB
Generic Receive Offload (GRO) processing implementations in the Linux
kernel, A remote attacker could use this to cause a stack corruption,
leading to a denial of service (system crash). (CVE-2016-7039)
Marco Grassi discovered a use-after-free condition could occur in the TCP
retransmit queue handling code in the Linux kernel. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2016-6828)
Pengfei Wang discovered a race condition in the audit subsystem in the
Linux kernel. A local attacker could use this to corrupt audit logs or
disrupt system-call auditing. (CVE-2016-6136)
Pengfei Wang discovered a race condition in the Adaptec AAC RAID controller
driver in the Linux kernel when handling ioctl()s. A local attacker could
use this to cause a denial of service (system crash). (CVE-2016-6480)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
linux-image-3.13.0-98-generic 3.13.0-98.145
linux-image-3.13.0-98-generic-lpae 3.13.0-98.145
linux-image-3.13.0-98-lowlatency 3.13.0-98.145
linux-image-3.13.0-98-powerpc-e500 3.13.0-98.145
linux-image-3.13.0-98-powerpc-e500mc 3.13.0-98.145
linux-image-3.13.0-98-powerpc-smp 3.13.0-98.145
linux-image-3.13.0-98-powerpc64-emb 3.13.0-98.145
linux-image-3.13.0-98-powerpc64-smp 3.13.0-98.145
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
http://www.ubuntu.com/usn/usn-3098-1
CVE-2016-6136, CVE-2016-6480, CVE-2016-6828, CVE-2016-7039
Package Information:
https://launchpad.net/ubuntu/+source/linux/3.13.0-98.145
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=44Iq
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-3097-1
October 11, 2016
linux vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
– linux: Linux kernel
Details:
Marco Grassi discovered a use-after-free condition could occur in the TCP
retransmit queue handling code in the Linux kernel. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2016-6828)
Pengfei Wang discovered a race condition in the audit subsystem in the
Linux kernel. A local attacker could use this to corrupt audit logs or
disrupt system-call auditing. (CVE-2016-6136)
Pengfei Wang discovered a race condition in the Adaptec AAC RAID controller
driver in the Linux kernel when handling ioctl()s. A local attacker could
use this to cause a denial of service (system crash). (CVE-2016-6480)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.2.0-111-generic 3.2.0-111.153
linux-image-3.2.0-111-generic-pae 3.2.0-111.153
linux-image-3.2.0-111-highbank 3.2.0-111.153
linux-image-3.2.0-111-omap 3.2.0-111.153
linux-image-3.2.0-111-powerpc-smp 3.2.0-111.153
linux-image-3.2.0-111-powerpc64-smp 3.2.0-111.153
linux-image-3.2.0-111-virtual 3.2.0-111.153
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
http://www.ubuntu.com/usn/usn-3097-1
CVE-2016-6136, CVE-2016-6480, CVE-2016-6828
Package Information:
https://launchpad.net/ubuntu/+source/linux/3.2.0-111.153
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
iQIcBAEBCgAGBQJX/HoJAAoJEC8Jno0AXoH0tQ4P/3W0nUjHBN16hwM1YLtik4jc
zuCn6tBPJ/okGaujMRcGq+NbPeW5gScoEIxFiC+YQ2t8prtYKdM6JZBWHK6T5wZT
057OwnTtKKIEKiNipv4cWNWJV11d6IwJb7Hyl29pm5ibmjTmSly4KK7HyOVWcRR1
Qd6fJcqtp2u7v0mgerYgFP0cW3shEr6sBtuMBZF5xH7Oi6Tvdfi1ehthR3AZn19j
PKJqoF3PlsnxcuD3LJmAfklS/w3ilRi61/zeE32lSK6kkVXIFbuREud2SKYE+pGc
0jorxIaaIwO8U66zu4LNiwckBTdTD9H96zRs3VIY/eRv6eg0Dtk6Iq+qOBxXfxBd
b9VCi7ONyf/lIwT0r9VedzFceMcjZCU+YM4XNU/P+yI9XHsFTLEi6INx3XkgJU67
zV592m/WQeED2QAger58Kytfdt5NqgbRR+EdIQTxCPUOkR68iJjbAfomdBFut5CS
tKdoJOPjl4y5tCX+GGjHEgz+Iydr4Y++6XaKaS+jaQJRa5g39rM5QshDiThxnpMt
LbX4e/E2Lil4I3b2yMTuMFvYdEtMBTgrDC1fN/P8G7xDAef8vrcf2YA7aRZv5xiV
0QH/WirmaBo5WG+iBAYx6q37yPxiUVX66/951Y3VNXHDPuouscGJzWFwqZP4y2y9
1aYey2J/WH28q8xHacOk
=I92p
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-3098-2
October 11, 2016
linux-lts-trusty vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
– linux-lts-trusty: Linux hardware enablement kernel from Trusty for Precise
Details:
USN-3098-1 fixed vulnerabilities in the Linux kernel for Ubuntu 14.04
LTS. This update provides the corresponding updates for the Linux
Hardware Enablement (HWE) kernel from Ubuntu 14.04 LTS for Ubuntu
12.04 LTS.
Vladimír Beneš discovered an unbounded recursion in the VLAN and TEB
Generic Receive Offload (GRO) processing implementations in the Linux
kernel, A remote attacker could use this to cause a stack corruption,
leading to a denial of service (system crash). (CVE-2016-7039)
Marco Grassi discovered a use-after-free condition could occur in the TCP
retransmit queue handling code in the Linux kernel. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2016-6828)
Pengfei Wang discovered a race condition in the audit subsystem in the
Linux kernel. A local attacker could use this to corrupt audit logs or
disrupt system-call auditing. (CVE-2016-6136)
Pengfei Wang discovered a race condition in the Adaptec AAC RAID controller
driver in the Linux kernel when handling ioctl()s. A local attacker could
use this to cause a denial of service (system crash). (CVE-2016-6480)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.13.0-98-generic 3.13.0-98.145~precise1
linux-image-3.13.0-98-generic-lpae 3.13.0-98.145~precise1
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
http://www.ubuntu.com/usn/usn-3098-2
http://www.ubuntu.com/usn/usn-3098-1
CVE-2016-6136, CVE-2016-6480, CVE-2016-6828, CVE-2016-7039
Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-trusty/3.13.0-98.145~precise1
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=mkBi
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-3099-2
October 11, 2016
linux-lts-xenial vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
– linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty
Details:
USN-3099-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04
LTS. This update provides the corresponding updates for the Linux
Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu
14.04 LTS.
Vladimír Beneš discovered an unbounded recursion in the VLAN and TEB
Generic Receive Offload (GRO) processing implementations in the Linux
kernel, A remote attacker could use this to cause a stack corruption,
leading to a denial of service (system crash). (CVE-2016-7039)
Marco Grassi discovered a use-after-free condition could occur in the TCP
retransmit queue handling code in the Linux kernel. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2016-6828)
Pengfei Wang discovered a race condition in the Adaptec AAC RAID controller
driver in the Linux kernel when handling ioctl()s. A local attacker could
use this to cause a denial of service (system crash). (CVE-2016-6480)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
linux-image-4.4.0-42-generic 4.4.0-42.62~14.04.1
linux-image-4.4.0-42-generic-lpae 4.4.0-42.62~14.04.1
linux-image-4.4.0-42-lowlatency 4.4.0-42.62~14.04.1
linux-image-4.4.0-42-powerpc-e500mc 4.4.0-42.62~14.04.1
linux-image-4.4.0-42-powerpc-smp 4.4.0-42.62~14.04.1
linux-image-4.4.0-42-powerpc64-emb 4.4.0-42.62~14.04.1
linux-image-4.4.0-42-powerpc64-smp 4.4.0-42.62~14.04.1
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
http://www.ubuntu.com/usn/usn-3099-2
http://www.ubuntu.com/usn/usn-3099-1
CVE-2016-6480, CVE-2016-6828, CVE-2016-7039
Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-xenial/4.4.0-42.62~14.04.1
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=vI53
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-3099-1
October 11, 2016
linux vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
– linux: Linux kernel
Details:
Vladimír Beneš discovered an unbounded recursion in the VLAN and TEB
Generic Receive Offload (GRO) processing implementations in the Linux
kernel, A remote attacker could use this to cause a stack corruption,
leading to a denial of service (system crash). (CVE-2016-7039)
Marco Grassi discovered a use-after-free condition could occur in the TCP
retransmit queue handling code in the Linux kernel. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2016-6828)
Pengfei Wang discovered a race condition in the s390 SCLP console driver
for the Linux kernel when handling ioctl()s. A local attacker could use
this to obtain sensitive information from kernel memory. (CVE-2016-6130)
Pengfei Wang discovered a race condition in the Adaptec AAC RAID controller
driver in the Linux kernel when handling ioctl()s. A local attacker could
use this to cause a denial of service (system crash). (CVE-2016-6480)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 LTS:
linux-image-4.4.0-42-generic 4.4.0-42.62
linux-image-4.4.0-42-generic-lpae 4.4.0-42.62
linux-image-4.4.0-42-lowlatency 4.4.0-42.62
linux-image-4.4.0-42-powerpc-e500mc 4.4.0-42.62
linux-image-4.4.0-42-powerpc-smp 4.4.0-42.62
linux-image-4.4.0-42-powerpc64-emb 4.4.0-42.62
linux-image-4.4.0-42-powerpc64-smp 4.4.0-42.62
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
http://www.ubuntu.com/usn/usn-3099-1
CVE-2016-6130, CVE-2016-6480, CVE-2016-6828, CVE-2016-7039
Package Information:
https://launchpad.net/ubuntu/+source/linux/4.4.0-42.62
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=dsY7
—–END PGP SIGNATURE—–
—