==========================================================================
Ubuntu Security Notice USN-3248-1
March 29, 2017
linux, linux-ti-omap4 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 12.04 LTS
Summary:
The system could be made to crash or run programs as an administrator.
Software Description:
– linux: Linux kernel
– linux-ti-omap4: Linux kernel for OMAP4
Details:
It was discovered that the xfrm framework for transforming packets in the
Linux kernel did not properly validate data received from user space. A
local attacker could use this to cause a denial of service (system crash)
or execute arbitrary code with administrative privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.2.0-125-generic 3.2.0-125.168
linux-image-3.2.0-125-generic-pae 3.2.0-125.168
linux-image-3.2.0-125-highbank 3.2.0-125.168
linux-image-3.2.0-125-omap 3.2.0-125.168
linux-image-3.2.0-125-powerpc-smp 3.2.0-125.168
linux-image-3.2.0-125-powerpc64-smp 3.2.0-125.168
linux-image-3.2.0-125-virtual 3.2.0-125.168
linux-image-3.2.0-1503-omap4 3.2.0-1503.130
linux-image-generic 3.2.0.125.140
linux-image-generic-pae 3.2.0.125.140
linux-image-highbank 3.2.0.125.140
linux-image-omap 3.2.0.125.140
linux-image-omap4 3.2.0.1503.98
linux-image-powerpc-smp 3.2.0.125.140
linux-image-powerpc64-smp 3.2.0.125.140
linux-image-virtual 3.2.0.125.140
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
http://www.ubuntu.com/usn/usn-3248-1
CVE-2017-7184
Package Information:
https://launchpad.net/ubuntu/+source/linux/3.2.0-125.168
https://launchpad.net/ubuntu/+source/linux-ti-omap4/3.2.0-1503.130
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=bqK2
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-3249-2
March 30, 2017
linux-lts-xenial vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 14.04 LTS
Summary:
The system could be made to crash or run programs as an administrator.
Software Description:
– linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty
Details:
USN-3249-1 fixed a vulnerability in the Linux kernel for Ubuntu 16.04
LTS. This update provides the corresponding updates for the Linux
Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu
14.04 LTS.
It was discovered that the xfrm framework for transforming packets in the
Linux kernel did not properly validate data received from user space. A
local attacker could use this to cause a denial of service (system crash)
or execute arbitrary code with administrative privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
linux-image-4.4.0-71-generic 4.4.0-71.92~14.04.1
linux-image-4.4.0-71-generic-lpae 4.4.0-71.92~14.04.1
linux-image-4.4.0-71-lowlatency 4.4.0-71.92~14.04.1
linux-image-4.4.0-71-powerpc-e500mc 4.4.0-71.92~14.04.1
linux-image-4.4.0-71-powerpc-smp 4.4.0-71.92~14.04.1
linux-image-4.4.0-71-powerpc64-smp 4.4.0-71.92~14.04.1
linux-image-generic-lpae-lts-xenial 4.4.0.71.58
linux-image-generic-lts-xenial 4.4.0.71.58
linux-image-lowlatency-lts-xenial 4.4.0.71.58
linux-image-powerpc-e500mc-lts-xenial 4.4.0.71.58
linux-image-powerpc-smp-lts-xenial 4.4.0.71.58
linux-image-powerpc64-smp-lts-xenial 4.4.0.71.58
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
http://www.ubuntu.com/usn/usn-3249-2
http://www.ubuntu.com/usn/usn-3249-1
CVE-2017-7184
Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-xenial/4.4.0-71.92~14.04.1
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=Gko+
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-3249-1
March 29, 2017
linux, linux-aws, linux-gke, linux-raspi2, linux-snapdragon vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 16.04 LTS
Summary:
The system could be made to crash or run programs as an administrator.
Software Description:
– linux: Linux kernel
– linux-aws: Linux kernel for Amazon Web Services (AWS) systems
– linux-gke: Linux kernel for Google Container Engine (GKE) systems
– linux-raspi2: Linux kernel for Raspberry Pi 2
– linux-snapdragon: Linux kernel for Snapdragon Processors
Details:
It was discovered that the xfrm framework for transforming packets in the
Linux kernel did not properly validate data received from user space. A
local attacker could use this to cause a denial of service (system crash)
or execute arbitrary code with administrative privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 LTS:
linux-image-4.4.0-1009-gke 4.4.0-1009.9
linux-image-4.4.0-1012-aws 4.4.0-1012.21
linux-image-4.4.0-1051-raspi2 4.4.0-1051.58
linux-image-4.4.0-1054-snapdragon 4.4.0-1054.58
linux-image-4.4.0-71-generic 4.4.0-71.92
linux-image-4.4.0-71-generic-lpae 4.4.0-71.92
linux-image-4.4.0-71-lowlatency 4.4.0-71.92
linux-image-4.4.0-71-powerpc-e500mc 4.4.0-71.92
linux-image-4.4.0-71-powerpc-smp 4.4.0-71.92
linux-image-4.4.0-71-powerpc64-smp 4.4.0-71.92
linux-image-aws 4.4.0.1012.15
linux-image-generic 4.4.0.71.77
linux-image-generic-lpae 4.4.0.71.77
linux-image-gke 4.4.0.1009.11
linux-image-lowlatency 4.4.0.71.77
linux-image-powerpc-e500mc 4.4.0.71.77
linux-image-powerpc-smp 4.4.0.71.77
linux-image-powerpc64-smp 4.4.0.71.77
linux-image-raspi2 4.4.0.1051.52
linux-image-snapdragon 4.4.0.1054.47
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
http://www.ubuntu.com/usn/usn-3249-1
CVE-2017-7184
Package Information:
https://launchpad.net/ubuntu/+source/linux/4.4.0-71.92
https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1012.21
https://launchpad.net/ubuntu/+source/linux-gke/4.4.0-1009.9
https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1051.58
https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1054.58
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=GOjO
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-3250-1
March 29, 2017
linux vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 14.04 LTS
Summary:
The system could be made to crash or run programs as an administrator.
Software Description:
– linux: Linux kernel
Details:
It was discovered that the xfrm framework for transforming packets in the
Linux kernel did not properly validate data received from user space. A
local attacker could use this to cause a denial of service (system crash)
or execute arbitrary code with administrative privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
linux-image-3.13.0-115-generic 3.13.0-115.162
linux-image-3.13.0-115-generic-lpae 3.13.0-115.162
linux-image-3.13.0-115-lowlatency 3.13.0-115.162
linux-image-3.13.0-115-powerpc-e500 3.13.0-115.162
linux-image-3.13.0-115-powerpc-e500mc 3.13.0-115.162
linux-image-3.13.0-115-powerpc-smp 3.13.0-115.162
linux-image-3.13.0-115-powerpc64-smp 3.13.0-115.162
linux-image-generic 3.13.0.115.125
linux-image-generic-lpae 3.13.0.115.125
linux-image-lowlatency 3.13.0.115.125
linux-image-powerpc-e500 3.13.0.115.125
linux-image-powerpc-e500mc 3.13.0.115.125
linux-image-powerpc-smp 3.13.0.115.125
linux-image-powerpc64-smp 3.13.0.115.125
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
http://www.ubuntu.com/usn/usn-3250-1
CVE-2017-7184
Package Information:
https://launchpad.net/ubuntu/+source/linux/3.13.0-115.162
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=ZCd1
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-3250-2
March 29, 2017
linux-lts-trusty vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 12.04 LTS
Summary:
The system could be made to crash or run programs as an administrator.
Software Description:
– linux-lts-trusty: Linux hardware enablement kernel from Trusty for Precise
Details:
USN-3250-1 fixed a vulnerability in the Linux kernel for Ubuntu 14.04
LTS. This update provides the corresponding updates for the Linux
Hardware Enablement (HWE) kernel from Ubuntu 14.04 LTS for Ubuntu
12.04 LTS.
It was discovered that the xfrm framework for transforming packets in the
Linux kernel did not properly validate data received from user space. A
local attacker could use this to cause a denial of service (system crash)
or execute arbitrary code with administrative privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.13.0-115-generic 3.13.0-115.162~precise1
linux-image-3.13.0-115-generic-lpae 3.13.0-115.162~precise1
linux-image-generic-lpae-lts-trusty 3.13.0.115.106
linux-image-generic-lts-trusty 3.13.0.115.106
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
http://www.ubuntu.com/usn/usn-3250-2
http://www.ubuntu.com/usn/usn-3250-1
CVE-2017-7184
Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-trusty/3.13.0-115.162~precise1
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=YMiR
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-3251-1
March 29, 2017
linux, linux-raspi2 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 16.10
Summary:
The system could be made to crash or run programs as an administrator.
Software Description:
– linux: Linux kernel
– linux-raspi2: Linux kernel for Raspberry Pi 2
Details:
It was discovered that the xfrm framework for transforming packets in the
Linux kernel did not properly validate data received from user space. A
local attacker could use this to cause a denial of service (system crash)
or execute arbitrary code with administrative privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.10:
linux-image-4.8.0-1032-raspi2 4.8.0-1032.35
linux-image-4.8.0-45-generic 4.8.0-45.48
linux-image-4.8.0-45-generic-lpae 4.8.0-45.48
linux-image-4.8.0-45-lowlatency 4.8.0-45.48
linux-image-4.8.0-45-powerpc-e500mc 4.8.0-45.48
linux-image-4.8.0-45-powerpc-smp 4.8.0-45.48
linux-image-generic 4.8.0.45.57
linux-image-generic-lpae 4.8.0.45.57
linux-image-lowlatency 4.8.0.45.57
linux-image-powerpc-e500mc 4.8.0.45.57
linux-image-powerpc-smp 4.8.0.45.57
linux-image-raspi2 4.8.0.1032.36
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
http://www.ubuntu.com/usn/usn-3251-1
CVE-2017-7184
Package Information:
https://launchpad.net/ubuntu/+source/linux/4.8.0-45.48
https://launchpad.net/ubuntu/+source/linux-raspi2/4.8.0-1032.35
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=jzz1
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-3251-2
March 30, 2017
linux-hwe vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 16.04 LTS
Summary:
The system could be made to crash or run programs as an administrator.
Software Description:
– linux-hwe: Linux hardware enablement (HWE) kernel
Details:
USN-3251-1 fixed a vulnerability in the Linux kernel for Ubuntu 16.10.
This update provides the corresponding updates for the Linux Hardware
Enablement (HWE) kernel from Ubuntu 16.10 for Ubuntu 16.04 LTS.
It was discovered that the xfrm framework for transforming packets in the
Linux kernel did not properly validate data received from user space. A
local attacker could use this to cause a denial of service (system crash)
or execute arbitrary code with administrative privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 LTS:
linux-image-4.8.0-45-generic 4.8.0-45.48~16.04.1
linux-image-4.8.0-45-generic-lpae 4.8.0-45.48~16.04.1
linux-image-4.8.0-45-lowlatency 4.8.0-45.48~16.04.1
linux-image-generic-hwe-16.04 4.8.0.45.17
linux-image-generic-lpae-hwe-16.04 4.8.0.45.17
linux-image-lowlatency-hwe-16.04 4.8.0.45.17
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
http://www.ubuntu.com/usn/usn-3251-2
http://www.ubuntu.com/usn/usn-3251-1
CVE-2017-7184
Package Information:
https://launchpad.net/ubuntu/+source/linux-hwe/4.8.0-45.48~16.04.1
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=8/gp
—–END PGP SIGNATURE—–
—