星球

Blog:Ubuntu security notices


最後更新: 2016/10/4 19:54:36
RSS | RDF | ATOM

USN-1373-1: OpenJDK 6 vulnerabilities

2012/2/25 11:03:15 | Ubuntu security notices

Ubuntu Security Notice USN-1373-1


24th February, 2012


openjdk-6 vulnerabilities


A security issue affects these releases of Ubuntu and its
derivatives:




  • Ubuntu 11.10


  • Ubuntu 11.04


  • Ubuntu 10.10


  • Ubuntu 10.04 LTS





Summary


Multiple OpenJDK 6 vulnerabilities have been fixed.





Software description





  • openjdk-6
    - Open Source Java implementation













Details


It was discovered that the Java HttpServer class did not limit the
number of headers read from a HTTP request. A remote attacker could
cause a denial of service by sending special requests that trigger
hash collisions predictably. (CVE-2011-5035)



ATTENTION: this update changes previous Java HttpServer class behavior
by limiting the number of request headers to 200. This may be increased
by adjusting the sun.net.httpserver.maxReqHeaders property.



It was discovered that the Java Sound component did not properly
check buffer boundaries. A remote attacker could use this to cause
a denial of service or view confidential data. (CVE-2011-3563)



It was discovered that the Java2D implementation does not properly
check graphics rendering objects before passing them to the native
renderer. A remote attacker could use this to cause a denial of
service or to bypass Java sandbox restrictions. (CVE-2012-0497)



It was discovered that an off-by-one error exists in the Java ZIP
file processing code. An attacker could us this to cause a denial of
service through a maliciously crafted ZIP file. (CVE-2012-0501)



It was discovered that the Java AWT KeyboardFocusManager did not
properly enforce keyboard focus security policy. A remote attacker
could use this with an untrusted application or applet to grab keyboard
focus and possibly expose confidential data. (CVE-2012-0502)



It was discovered that the Java TimeZone class did not properly enforce
security policy around setting the default time zone. A remote attacker
could use this with an untrusted application or applet to set a new
default time zone and bypass Java sandbox restrictions. (CVE-2012-0503)



It was discovered the Java ObjectStreamClass did not throw
an accurately identifiable exception when a deserialization
failure occurred. A remote attacker could use this with
an untrusted application or applet to bypass Java sandbox
restrictions. (CVE-2012-0505)



It was discovered that the Java CORBA implementation did not properly
protect repository identifiers on certain CORBA objects. A remote
attacker could use this to corrupt object data. (CVE-2012-0506)



It was discovered that the Java AtomicReferenceArray class
implementation did not properly check if an array was of
the expected Object[] type. A remote attacker could use this
with a malicious application or applet to bypass Java sandbox
restrictions. (CVE-2012-0507)



Update instructions


The problem can be corrected by updating your system to the following
package version:




Ubuntu 11.10:




icedtea-6-jre-cacao

6b23~pre11-0ubuntu1.11.10.2






icedtea-6-jre-jamvm

6b23~pre11-0ubuntu1.11.10.2






openjdk-6-jre

6b23~pre11-0ubuntu1.11.10.2






openjdk-6-jre-headless

6b23~pre11-0ubuntu1.11.10.2






openjdk-6-jre-zero

6b23~pre11-0ubuntu1.11.10.2






openjdk-6-jre-lib

6b23~pre11-0ubuntu1.11.10.2





Ubuntu 11.04:




icedtea-6-jre-cacao

6b22-1.10.6-0ubuntu1






icedtea-6-jre-jamvm

6b22-1.10.6-0ubuntu1






openjdk-6-jre

6b22-1.10.6-0ubuntu1






openjdk-6-jre-headless

6b22-1.10.6-0ubuntu1






openjdk-6-jre-zero

6b22-1.10.6-0ubuntu1






openjdk-6-jre-lib

6b22-1.10.6-0ubuntu1





Ubuntu 10.10:




openjdk-6-jre-headless

6b20-1.9.13-0ubuntu1~10.10.1






openjdk-6-jre-lib

6b20-1.9.13-0ubuntu1~10.10.1






icedtea-6-jre-cacao

6b20-1.9.13-0ubuntu1~10.10.1






openjdk-6-jre-zero

6b20-1.9.13-0ubuntu1~10.10.1






openjdk-6-jre

6b20-1.9.13-0ubuntu1~10.10.1





Ubuntu 10.04 LTS:




openjdk-6-jre-headless

6b20-1.9.13-0ubuntu1~10.04.1






openjdk-6-jre-lib

6b20-1.9.13-0ubuntu1~10.04.1






icedtea-6-jre-cacao

6b20-1.9.13-0ubuntu1~10.04.1






openjdk-6-jre-zero

6b20-1.9.13-0ubuntu1~10.04.1






openjdk-6-jre

6b20-1.9.13-0ubuntu1~10.04.1






To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.


After a standard system update you need to restart any Java applications
or applets to make all the necessary changes.





References




CVE-2011-3563,

CVE-2011-5035,

CVE-2012-0497,

CVE-2012-0501,

CVE-2012-0502,

CVE-2012-0503,

CVE-2012-0505,

CVE-2012-0506,

CVE-2012-0507


USN-1105-1: Linux kernel vulnerabilities

2011/4/14 22:21:26 | Ubuntu security notices

Ubuntu Security Notice USN-1105-1


5th April, 2011


linux vulnerabilities


A security issue affects these releases of Ubuntu and its
derivatives:




  • Ubuntu 8.04 LTS





Summary


Multiple kernel flaws.





Software description





  • linux
    - Linux kernel







Details


Dan Rosenberg discovered that multiple terminal ioctls did not correctly
initialize structure memory. A local attacker could exploit this to read
portions of kernel stack memory, leading to a loss of privacy.
(CVE-2010-4075, CVE-2010-4076, CVE-2010-4077)



Dan Rosenberg discovered that the socket filters did not correctly
initialize structure memory. A local attacker could create malicious
filters to read portions of kernel stack memory, leading to a loss of
privacy. (CVE-2010-4158)



Dan Rosenberg discovered that certain iovec operations did not calculate
page counts correctly. A local attacker could exploit this to crash the
system, leading to a denial of service. (CVE-2010-4162)



Dan Rosenberg discovered that the SCSI subsystem did not correctly validate
iov segments. A local attacker with access to a SCSI device could send
specially crafted requests to crash the system, leading to a denial of
service. (CVE-2010-4163)



Dan Rosenberg discovered multiple flaws in the X.25 facilities parsing.
If a system was using X.25, a remote attacker could exploit this to
crash the system, leading to a denial of service. (CVE-2010-4164)



Alan Cox discovered that the HCI UART driver did not correctly check if a
write operation was available. If the mmap_min-addr sysctl was changed from
the Ubuntu default to a value of 0, a local attacker could exploit this
flaw to gain root privileges. (CVE-2010-4242)



Nelson Elhage discovered that the kernel did not correctly handle process
cleanup after triggering a recoverable kernel bug. If a local attacker
were able to trigger certain kinds of kernel bugs, they could create a
specially crafted process to gain root privileges. (CVE-2010-4258)



Tavis Ormandy discovered that the install_special_mapping function could
bypass the mmap_min_addr restriction. A local attacker could exploit this
to mmap 4096 bytes below the mmap_min_addr area, possibly improving the
chances of performing NULL pointer dereference attacks. (CVE-2010-4346)



Update instructions


The problem can be corrected by updating your system to the following
package version:




Ubuntu 8.04 LTS:




linux-image-2.6.24-29-sparc64

2.6.24-29.88






linux-image-2.6.24-29-rt

2.6.24-29.88






linux-image-2.6.24-29-lpia

2.6.24-29.88






linux-image-2.6.24-29-itanium

2.6.24-29.88






linux-image-2.6.24-29-generic

2.6.24-29.88






linux-image-2.6.24-29-openvz

2.6.24-29.88






linux-image-2.6.24-29-hppa32

2.6.24-29.88






linux-image-2.6.24-29-xen

2.6.24-29.88






linux-image-2.6.24-29-powerpc

2.6.24-29.88






linux-image-2.6.24-29-powerpc-smp

2.6.24-29.88






linux-image-2.6.24-29-hppa64

2.6.24-29.88






linux-image-2.6.24-29-server

2.6.24-29.88






linux-image-2.6.24-29-powerpc64-smp

2.6.24-29.88






linux-image-2.6.24-29-386

2.6.24-29.88






linux-image-2.6.24-29-virtual

2.6.24-29.88






linux-image-2.6.24-29-mckinley

2.6.24-29.88






linux-image-2.6.24-29-sparc64-smp

2.6.24-29.88






linux-image-2.6.24-29-lpiacompat

2.6.24-29.88








After a standard system update you need to reboot your computer to make
all the necessary changes.



ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.





References




CVE-2010-4075,

CVE-2010-4076,

CVE-2010-4077,

CVE-2010-4158,

CVE-2010-4162,

CVE-2010-4163,

CVE-2010-4164,

CVE-2010-4242,

CVE-2010-4258,

CVE-2010-4346


USN-2089-1: OpenJDK 7 vulnerabilities

2014/1/27 18:29:26 | Ubuntu security notices

Ubuntu Security Notice USN-2089-1


23rd January, 2014


openjdk-7 vulnerabilities


A security issue affects these releases of Ubuntu and its
derivatives:




  • Ubuntu 13.10


  • Ubuntu 13.04


  • Ubuntu 12.10





Summary


Several security issues were fixed in OpenJDK 7.





Software description





  • openjdk-7
    - Open Source Java implementation











Details



Several vulnerabilities were discovered in the OpenJDK JRE related to
information disclosure and data integrity. An attacker could exploit these
to expose sensitive data over the network. (CVE-2013-3829, CVE-2013-5783,
CVE-2013-5804, CVE-2014-0411)



Several vulnerabilities were discovered in the OpenJDK JRE related to
availability. An attacker could exploit these to cause a denial of service.
(CVE-2013-4002, CVE-2013-5803, CVE-2013-5823, CVE-2013-5825, CVE-2013-5896,
CVE-2013-5910)



Several vulnerabilities were discovered in the OpenJDK JRE related to data
integrity. (CVE-2013-5772, CVE-2013-5774, CVE-2013-5784, CVE-2013-5797,
CVE-2013-5820, CVE-2014-0376, CVE-2014-0416)



Several vulnerabilities were discovered in the OpenJDK JRE related to
information disclosure. An attacker could exploit these to expose sensitive
data over the network. (CVE-2013-5778, CVE-2013-5780, CVE-2013-5790,
CVE-2013-5800, CVE-2013-5840, CVE-2013-5849, CVE-2013-5851, CVE-2013-5884,
CVE-2014-0368)



Several vulnerabilities were discovered in the OpenJDK JRE related to
information disclosure, data integrity and availability. An attacker could
exploit these to cause a denial of service or expose sensitive data over
the network. (CVE-2013-5782, CVE-2013-5802, CVE-2013-5809, CVE-2013-5829,
CVE-2013-5814, CVE-2013-5817, CVE-2013-5830, CVE-2013-5842, CVE-2013-5850,
CVE-2013-5878, CVE-2013-5893, CVE-2013-5907, CVE-2014-0373, CVE-2014-0408,
CVE-2014-0422, CVE-2014-0428)



A vulnerability was discovered in the OpenJDK JRE related to information
disclosure and availability. An attacker could exploit this to expose
sensitive data over the network or cause a denial of service.
(CVE-2014-0423)



Update instructions


The problem can be corrected by updating your system to the following
package version:




Ubuntu 13.10:




openjdk-7-jre-lib

7u51-2.4.4-0ubuntu0.13.10.1






openjdk-7-jre-zero

7u51-2.4.4-0ubuntu0.13.10.1






icedtea-7-jre-jamvm

7u51-2.4.4-0ubuntu0.13.10.1






openjdk-7-jre-headless

7u51-2.4.4-0ubuntu0.13.10.1






openjdk-7-jre

7u51-2.4.4-0ubuntu0.13.10.1





Ubuntu 13.04:




openjdk-7-jre-lib

7u51-2.4.4-0ubuntu0.13.04.2






openjdk-7-jre-zero

7u51-2.4.4-0ubuntu0.13.04.2






icedtea-7-jre-jamvm

7u51-2.4.4-0ubuntu0.13.04.2






openjdk-7-jre-headless

7u51-2.4.4-0ubuntu0.13.04.2






openjdk-7-jre

7u51-2.4.4-0ubuntu0.13.04.2





Ubuntu 12.10:




openjdk-7-jre-zero

7u51-2.4.4-0ubuntu0.12.10.2






icedtea-7-jre-jamvm

7u51-2.4.4-0ubuntu0.12.10.2






icedtea-7-jre-cacao

7u51-2.4.4-0ubuntu0.12.10.2






openjdk-7-jre-lib

7u51-2.4.4-0ubuntu0.12.10.2






openjdk-7-jre-headless

7u51-2.4.4-0ubuntu0.12.10.2






openjdk-7-jre

7u51-2.4.4-0ubuntu0.12.10.2






To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.


This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any Java
applications or applets to make all the necessary changes.





References




CVE-2013-3829,

CVE-2013-4002,

CVE-2013-5772,

CVE-2013-5774,

CVE-2013-5778,

CVE-2013-5780,

CVE-2013-5782,

CVE-2013-5783,

CVE-2013-5784,

CVE-2013-5790,

CVE-2013-5797,

CVE-2013-5800,

CVE-2013-5802,

CVE-2013-5803,

CVE-2013-5804,

CVE-2013-5805,

CVE-2013-5806,

CVE-2013-5809,

CVE-2013-5814,

CVE-2013-5817,

CVE-2013-5820,

CVE-2013-5823,

CVE-2013-5825,

CVE-2013-5829,

CVE-2013-5830,

CVE-2013-5840,

CVE-2013-5842,

CVE-2013-5849,

CVE-2013-5850,

CVE-2013-5851,

CVE-2013-5878,

CVE-2013-5884,

CVE-2013-5893,

CVE-2013-5896,

CVE-2013-5907,

CVE-2013-5910,

CVE-2014-0368,

CVE-2014-0373,

CVE-2014-0376,

CVE-2014-0408,

CVE-2014-0411,

CVE-2014-0416,

CVE-2014-0422,

CVE-2014-0423,

CVE-2014-0428


USN-1071-1: Linux kernel vulnerabilities

2011/4/14 22:21:26 | Ubuntu security notices

Ubuntu Security Notice USN-1071-1


25th February, 2011


linux-source-2.6.15 vulnerabilities


A security issue affects these releases of Ubuntu and its
derivatives:




  • Ubuntu 6.06 LTS





Summary


XXX NOT IMPLEMENTED YET (requires new templates) XXX
XXX-APP-XXX could be made to run programs as your login if it opened a
specially crafted file.
XXX OR XXX
An attacker could send crafted input to XXX-APP-XXX and cause it to
crash.
XXX OR XXX
XXX TODO: ADD MORE TEMPLATE TEXT XXX





Software description





  • linux-source-2.6.15
    - ACPI support modules (udeb)







Details


Tavis Ormandy discovered that the Linux kernel did not properly implement
exception fixup. A local attacker could exploit this to crash the kernel,
leading to a denial of service. (CVE-2010-3086)



Dan Rosenberg discovered that the Linux kernel TIPC implementation
contained multiple integer signedness errors. A local attacker could
exploit this to gain root privileges. (CVE-2010-3859)



Dan Rosenberg discovered that the Linux kernel X.25 implementation
incorrectly parsed facilities. A remote attacker could exploit this to
crash the kernel, leading to a denial of service. (CVE-2010-3873)



Vasiliy Kulikov discovered that the Linux kernel X.25 implementation did
not correctly clear kernel memory. A local attacker could exploit this to
read kernel stack memory, leading to a loss of privacy. (CVE-2010-3875)



Vasiliy Kulikov discovered that the Linux kernel sockets implementation
did not properly initialize certain structures. A local attacker could
exploit this to read kernel stack memory, leading to a loss of privacy.
(CVE-2010-3876)



Nelson Elhage discovered that the Linux kernel IPv4 implementation did not
properly audit certain bytecodes in netlink messages. A local attacker
could exploit this to cause the kernel to hang, leading to a denial of
service. (CVE-2010-3880)



Dan Rosenberg discovered that the SiS video driver did not correctly clear
kernel memory. A local attacker could exploit this to read kernel stack
memory, leading to a loss of privacy. (CVE-2010-4078)



Dan Rosenberg discovered that the RME Hammerfall DSP audio interface driver
did not correctly clear kernel memory. A local attacker could exploit this
to read kernel stack memory, leading to a loss of privacy. (CVE-2010-4080,
CVE-2010-4081)



Dan Rosenberg discovered that the semctl syscall did not correctly clear
kernel memory. A local attacker could exploit this to read kernel stack
memory, leading to a loss of privacy. (CVE-2010-4083)



James Bottomley discovered that the ICP vortex storage array controller
driver did not validate certain sizes. A local attacker on a 64bit system
could exploit this to crash the kernel, leading to a denial of service.
(CVE-2010-4157)



Dan Rosenberg discovered that the Linux kernel L2TP implementation
contained multiple integer signedness errors. A local attacker could
exploit this to to crash the kernel, or possibly gain root privileges.
(CVE-2010-4160)



Update instructions


The problem can be corrected by updating your system to the following
package version:




Ubuntu 6.06 LTS:




linux-image-2.6.15-55-hppa64

2.6.15-55.93






linux-image-2.6.15-55-mckinley

2.6.15-55.93






linux-image-2.6.15-55-powerpc-smp

2.6.15-55.93






linux-image-2.6.15-55-hppa32-smp

2.6.15-55.93






linux-image-2.6.15-55-686

2.6.15-55.93






linux-image-2.6.15-55-amd64-k8

2.6.15-55.93






linux-image-2.6.15-55-amd64-server

2.6.15-55.93






linux-image-2.6.15-55-386

2.6.15-55.93






linux-image-2.6.15-55-sparc64-smp

2.6.15-55.93






linux-image-2.6.15-55-k7

2.6.15-55.93






linux-image-2.6.15-55-sparc64

2.6.15-55.93






linux-image-2.6.15-55-server

2.6.15-55.93






linux-image-2.6.15-55-powerpc64-smp

2.6.15-55.93






linux-image-2.6.15-55-hppa32

2.6.15-55.93






linux-image-2.6.15-55-mckinley-smp

2.6.15-55.93






linux-image-2.6.15-55-server-bigiron

2.6.15-55.93






linux-image-2.6.15-55-itanium-smp

2.6.15-55.93






linux-image-2.6.15-55-amd64-xeon

2.6.15-55.93






linux-image-2.6.15-55-powerpc

2.6.15-55.93






linux-image-2.6.15-55-amd64-generic

2.6.15-55.93






linux-image-2.6.15-55-hppa64-smp

2.6.15-55.93






linux-image-2.6.15-55-itanium

2.6.15-55.93








After a standard system update you need to reboot your computer to make
all the necessary changes.





References




CVE-2010-3086,

CVE-2010-3859,

CVE-2010-3873,

CVE-2010-3875,

CVE-2010-3876,

CVE-2010-3880,

CVE-2010-4078,

CVE-2010-4080,

CVE-2010-4081,

CVE-2010-4083,

CVE-2010-4157,

CVE-2010-4160


USN-1061-1: iTALC vulnerability

2011/2/11 9:27:02 | Ubuntu security notices

Referenced CVEs: 



CVE-2011-0724




Description: 




===========================================================
Ubuntu Security Notice USN-1061-1 February 11, 2011
italc vulnerability
CVE-2011-0724
===========================================================

A security issue affects the following Edubuntu releases:

Edubuntu 9.10
Edubuntu 10.04 LTS
Edubuntu 10.10

This advisory does not apply to the corresponding versions of
Ubuntu, Kubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Edubuntu 9.10:
italc-client 1:1.0.9.1-0ubuntu16.1

Edubuntu 10.04 LTS:
italc-client 1:1.0.9.1-0ubuntu18.10.04.1

Edubuntu 10.10:
italc-client 1:1.0.9.1-0ubuntu18.10.10.1

After a standard system update, if you had originally installed from
the Edubuntu Live DVD and the bad keys were found, you will need to
redistribute the newly generated public keys to your iTALC clients and
restart each session. For more details, see:
https://wiki.ubuntu.com/iTalc/Keys

Details follow:

Stéphane Graber discovered that the iTALC private keys shipped with the
Edubuntu Live DVD were not correctly regenerated once Edubuntu was
installed. If an iTALC client was installed with the vulnerable keys, a
remote attacker could gain control of the system. Only systems using keys
from the Edubuntu Live DVD were affected.


USN-1041-1: Linux kernel vulnerabilities

2011/1/11 6:38:23 | Ubuntu security notices

Referenced CVEs: 



CVE-2010-2537, CVE-2010-2538, CVE-2010-2943, CVE-2010-2962, CVE-2010-3079, CVE-2010-3296, CVE-2010-3297, CVE-2010-3298, CVE-2010-3301, CVE-2010-3858, CVE-2010-3861, CVE-2010-4072




Description: 




===========================================================
Ubuntu Security Notice USN-1041-1 January 10, 2011
linux, linux-ec2 vulnerabilities
CVE-2010-2537, CVE-2010-2538, CVE-2010-2943, CVE-2010-2962,
CVE-2010-3079, CVE-2010-3296, CVE-2010-3297, CVE-2010-3298,
CVE-2010-3301, CVE-2010-3858, CVE-2010-3861, CVE-2010-4072
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 9.10
Ubuntu 10.04 LTS
Ubuntu 10.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 9.10:
linux-image-2.6.31-22-386 2.6.31-22.70
linux-image-2.6.31-22-generic 2.6.31-22.70
linux-image-2.6.31-22-generic-pae 2.6.31-22.70
linux-image-2.6.31-22-ia64 2.6.31-22.70
linux-image-2.6.31-22-lpia 2.6.31-22.70
linux-image-2.6.31-22-powerpc 2.6.31-22.70
linux-image-2.6.31-22-powerpc-smp 2.6.31-22.70
linux-image-2.6.31-22-powerpc64-smp 2.6.31-22.70
linux-image-2.6.31-22-server 2.6.31-22.70
linux-image-2.6.31-22-sparc64 2.6.31-22.70
linux-image-2.6.31-22-sparc64-smp 2.6.31-22.70
linux-image-2.6.31-22-virtual 2.6.31-22.70
linux-image-2.6.31-307-ec2 2.6.31-307.23

Ubuntu 10.04 LTS:
linux-image-2.6.32-27-386 2.6.32-27.49
linux-image-2.6.32-27-generic 2.6.32-27.49
linux-image-2.6.32-27-generic-pae 2.6.32-27.49
linux-image-2.6.32-27-ia64 2.6.32-27.49
linux-image-2.6.32-27-lpia 2.6.32-27.49
linux-image-2.6.32-27-powerpc 2.6.32-27.49
linux-image-2.6.32-27-powerpc-smp 2.6.32-27.49
linux-image-2.6.32-27-powerpc64-smp 2.6.32-27.49
linux-image-2.6.32-27-preempt 2.6.32-27.49
linux-image-2.6.32-27-server 2.6.32-27.49
linux-image-2.6.32-27-sparc64 2.6.32-27.49
linux-image-2.6.32-27-sparc64-smp 2.6.32-27.49
linux-image-2.6.32-27-versatile 2.6.32-27.49
linux-image-2.6.32-27-virtual 2.6.32-27.49
linux-image-2.6.32-311-ec2 2.6.32-311.23

Ubuntu 10.10:
linux-image-2.6.35-24-generic 2.6.35-24.42
linux-image-2.6.35-24-generic-pae 2.6.35-24.42
linux-image-2.6.35-24-omap 2.6.35-24.42
linux-image-2.6.35-24-powerpc 2.6.35-24.42
linux-image-2.6.35-24-powerpc-smp 2.6.35-24.42
linux-image-2.6.35-24-powerpc64-smp 2.6.35-24.42
linux-image-2.6.35-24-server 2.6.35-24.42
linux-image-2.6.35-24-versatile 2.6.35-24.42
linux-image-2.6.35-24-virtual 2.6.35-24.42

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the Ubuntu 10.04 LTS and
Ubuntu 10.10 kernel updates have been given a new version number,
which requires you to recompile and reinstall all third party kernel
modules you might have installed. If you use linux-restricted-modules,
you have to update that package as well to get modules which work with
the new kernel version. Unless you manually uninstalled the standard
kernel metapackages (e.g. linux-generic, linux-server, linux-powerpc),
a standard system upgrade will automatically perform this as well.

Details follow:

Dan Rosenberg discovered that the btrfs filesystem did not correctly
validate permissions when using the clone function. A local attacker could
overwrite the contents of file handles that were opened for append-only,
or potentially read arbitrary contents, leading to a loss of privacy. Only
Ubuntu 9.10 was affected. (CVE-2010-2537, CVE-2010-2538)

Dave Chinner discovered that the XFS filesystem did not correctly order
inode lookups when exported by NFS. A remote attacker could exploit this
to read or write disk blocks that had changed file assignement or had
become unlinked, leading to a loss of privacy. (CVE-2010-2943)

Kees Cook discovered that the Intel i915 graphics driver did not
correctly validate memory regions. A local attacker with access to the
video card could read and write arbitrary kernel memory to gain root
privileges. Ubuntu 10.10 was not affected. (CVE-2010-2962)

Robert Swiecki discovered that ftrace did not correctly handle mutexes. A
local attacker could exploit this to crash the kernel, leading to a
denial of service. (CVE-2010-3079)

Dan Rosenberg discovered that several network ioctls did not clear kernel
memory correctly. A local user could exploit this to read kernel stack
memory, leading to a loss of privacy. (CVE-2010-3296, CVE-2010-3297,
CVE-2010-3298)

Ben Hawkes discovered that the Linux kernel did not correctly filter
registers on 64bit kernels when performing 32bit system calls. On a
64bit system, a local attacker could manipulate 32bit system calls
to gain root privileges. The Ubuntu EC2 kernels needed additional
fixing. (CVE-2010-3301)

Brad Spengler discovered that stack memory for new a process was not
correctly calculated. A local attacker could exploit this to crash the
system, leading to a denial of service. (CVE-2010-3858)

Kees Cook discovered that the ethtool interface did not correctly clear
kernel memory. A local attacker could read kernel heap memory, leading
to a loss of privacy. (CVE-2010-3861)

Kees Cook and Vasiliy Kulikov discovered that the shm interface did not
clear kernel memory correctly. A local attacker could exploit this to
read kernel stack memory, leading to a loss of privacy. (CVE-2010-4072)


USN-1107-1: x11-xserver-utils vulnerability

2011/4/7 2:18:29 | Ubuntu security notices

Referenced CVEs: 



CVE-2011-0465




Description: 




===========================================================
Ubuntu Security Notice USN-1107-1 April 06, 2011
x11-xserver-utils vulnerability
CVE-2011-0465
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 8.04 LTS
Ubuntu 9.10
Ubuntu 10.04 LTS
Ubuntu 10.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 8.04 LTS:
x11-xserver-utils 7.3+2ubuntu0.1

Ubuntu 9.10:
x11-xserver-utils 7.4+2ubuntu3.1

Ubuntu 10.04 LTS:
x11-xserver-utils 7.5+1ubuntu2.1

Ubuntu 10.10:
x11-xserver-utils 7.5+2ubuntu1.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

Details follow:

Sebastian Krahmer discovered that the xrdb utility incorrectly filtered
crafted hostnames. An attacker could use this flaw with a malicious
DHCP server or with a remote xdmcp login and execute arbitrary code,
resulting in root privilege escalation.


USN-1090-1: Linux kernel vulnerabilities

2011/3/19 6:29:04 | Ubuntu security notices

Referenced CVEs: 



CVE-2010-4075, CVE-2010-4076, CVE-2010-4077, CVE-2010-4158, CVE-2010-4163, CVE-2010-4175




Description: 




===========================================================
Ubuntu Security Notice USN-1090-1 March 18, 2011
linux vulnerabilities
CVE-2010-4075, CVE-2010-4076, CVE-2010-4077, CVE-2010-4158,
CVE-2010-4163, CVE-2010-4175
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 10.04 LTS
Ubuntu 10.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 10.04 LTS:
linux-image-2.6.32-30-386 2.6.32-30.59
linux-image-2.6.32-30-generic 2.6.32-30.59
linux-image-2.6.32-30-generic-pae 2.6.32-30.59
linux-image-2.6.32-30-ia64 2.6.32-30.59
linux-image-2.6.32-30-lpia 2.6.32-30.59
linux-image-2.6.32-30-powerpc 2.6.32-30.59
linux-image-2.6.32-30-powerpc-smp 2.6.32-30.59
linux-image-2.6.32-30-powerpc64-smp 2.6.32-30.59
linux-image-2.6.32-30-preempt 2.6.32-30.59
linux-image-2.6.32-30-server 2.6.32-30.59
linux-image-2.6.32-30-sparc64 2.6.32-30.59
linux-image-2.6.32-30-sparc64-smp 2.6.32-30.59
linux-image-2.6.32-30-versatile 2.6.32-30.59
linux-image-2.6.32-30-virtual 2.6.32-30.59

Ubuntu 10.10:
linux-image-2.6.35-28-generic 2.6.35-28.49
linux-image-2.6.35-28-generic-pae 2.6.35-28.49
linux-image-2.6.35-28-omap 2.6.35-28.49
linux-image-2.6.35-28-powerpc 2.6.35-28.49
linux-image-2.6.35-28-powerpc-smp 2.6.35-28.49
linux-image-2.6.35-28-powerpc64-smp 2.6.35-28.49
linux-image-2.6.35-28-server 2.6.35-28.49
linux-image-2.6.35-28-versatile 2.6.35-28.49
linux-image-2.6.35-28-virtual 2.6.35-28.49

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

Details follow:

Dan Rosenberg discovered that multiple terminal ioctls did not correctly
initialize structure memory. A local attacker could exploit this to read
portions of kernel stack memory, leading to a loss of privacy.
(CVE-2010-4075, CVE-2010-4076, CVE-2010-4077)

Dan Rosenberg discovered that the socket filters did not correctly
initialize structure memory. A local attacker could create malicious
filters to read portions of kernel stack memory, leading to a loss of
privacy. (Ubuntu 10.10 was already fixed in a prior update.) (CVE-2010-4158)

Dan Rosenberg discovered that the SCSI subsystem did not correctly validate
iov segments. A local attacker with access to a SCSI device could send
specially crafted requests to crash the system, leading to a denial of
service. (CVE-2010-4163)

Dan Rosenberg discovered that the RDS protocol did not correctly check
ioctl arguments. A local attacker could exploit this to crash the system,
leading to a denial of service. (CVE-2010-4175)


USN-3078-1: MySQL vulnerability

2016/9/19 12:55:43 | Ubuntu security notices

Ubuntu Security Notice USN-3078-1


13th September, 2016


mysql-5.5, mysql-5.7 vulnerability


A security issue affects these releases of Ubuntu and its
derivatives:




  • Ubuntu 16.04 LTS


  • Ubuntu 14.04 LTS


  • Ubuntu 12.04 LTS





Summary


MySQL could be made to run programs as an administrator.





Software description





  • mysql-5.5
    - MySQL database







  • mysql-5.7
    - MySQL database







Details


Dawid Golunski discovered that MySQL incorrectly handled configuration
files. A remote attacker could possibly use this issue to execute arbitrary
code with root privileges.



MySQL has been updated to 5.5.52 in Ubuntu 12.04 LTS and Ubuntu 14.04 LTS.
Ubuntu 16.04 LTS has been updated to MySQL 5.7.15.



In addition to security fixes, the updated packages contain bug fixes,
new features, and possibly incompatible changes.



Please see the following for more information:
http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-51.html
http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-52.html
http://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-14.html
http://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-15.html



Update instructions


The problem can be corrected by updating your system to the following
package version:




Ubuntu 16.04 LTS:




mysql-server-5.7

5.7.15-0ubuntu0.16.04.1





Ubuntu 14.04 LTS:




mysql-server-5.5

5.5.52-0ubuntu0.14.04.1





Ubuntu 12.04 LTS:




mysql-server-5.5

5.5.52-0ubuntu0.12.04.1






To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.


In general, a standard system update will make all the necessary changes.





References




CVE-2016-6662


USN-1023-1: Linux kernel vulnerabilities

2010/11/30 10:23:58 | Ubuntu security notices

Referenced CVEs: 



CVE-2010-3848, CVE-2010-3849, CVE-2010-3850




Description: 




===========================================================
Ubuntu Security Notice USN-1023-1 November 30, 2010
linux, linux-{ec2,source-2.6.15} vulnerabilities
CVE-2010-3848, CVE-2010-3849, CVE-2010-3850
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 8.04 LTS
Ubuntu 9.10
Ubuntu 10.04 LTS
Ubuntu 10.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
linux-image-2.6.15-55-386 2.6.15-55.90
linux-image-2.6.15-55-686 2.6.15-55.90
linux-image-2.6.15-55-amd64-generic 2.6.15-55.90
linux-image-2.6.15-55-amd64-k8 2.6.15-55.90
linux-image-2.6.15-55-amd64-server 2.6.15-55.90
linux-image-2.6.15-55-amd64-xeon 2.6.15-55.90
linux-image-2.6.15-55-hppa32 2.6.15-55.90
linux-image-2.6.15-55-hppa32-smp 2.6.15-55.90
linux-image-2.6.15-55-hppa64 2.6.15-55.90
linux-image-2.6.15-55-hppa64-smp 2.6.15-55.90
linux-image-2.6.15-55-itanium 2.6.15-55.90
linux-image-2.6.15-55-itanium-smp 2.6.15-55.90
linux-image-2.6.15-55-k7 2.6.15-55.90
linux-image-2.6.15-55-mckinley 2.6.15-55.90
linux-image-2.6.15-55-mckinley-smp 2.6.15-55.90
linux-image-2.6.15-55-powerpc 2.6.15-55.90
linux-image-2.6.15-55-powerpc-smp 2.6.15-55.90
linux-image-2.6.15-55-powerpc64-smp 2.6.15-55.90
linux-image-2.6.15-55-server 2.6.15-55.90
linux-image-2.6.15-55-server-bigiron 2.6.15-55.90
linux-image-2.6.15-55-sparc64 2.6.15-55.90
linux-image-2.6.15-55-sparc64-smp 2.6.15-55.90

Ubuntu 8.04 LTS:
linux-image-2.6.24-28-386 2.6.24-28.81
linux-image-2.6.24-28-generic 2.6.24-28.81
linux-image-2.6.24-28-hppa32 2.6.24-28.81
linux-image-2.6.24-28-hppa64 2.6.24-28.81
linux-image-2.6.24-28-itanium 2.6.24-28.81
linux-image-2.6.24-28-lpia 2.6.24-28.81
linux-image-2.6.24-28-lpiacompat 2.6.24-28.81
linux-image-2.6.24-28-mckinley 2.6.24-28.81
linux-image-2.6.24-28-openvz 2.6.24-28.81
linux-image-2.6.24-28-powerpc 2.6.24-28.81
linux-image-2.6.24-28-powerpc-smp 2.6.24-28.81
linux-image-2.6.24-28-powerpc64-smp 2.6.24-28.81
linux-image-2.6.24-28-rt 2.6.24-28.81
linux-image-2.6.24-28-server 2.6.24-28.81
linux-image-2.6.24-28-sparc64 2.6.24-28.81
linux-image-2.6.24-28-sparc64-smp 2.6.24-28.81
linux-image-2.6.24-28-virtual 2.6.24-28.81
linux-image-2.6.24-28-xen 2.6.24-28.81

Ubuntu 9.10:
linux-image-2.6.31-22-386 2.6.31-22.69
linux-image-2.6.31-22-generic 2.6.31-22.69
linux-image-2.6.31-22-generic-pae 2.6.31-22.69
linux-image-2.6.31-22-ia64 2.6.31-22.69
linux-image-2.6.31-22-lpia 2.6.31-22.69
linux-image-2.6.31-22-powerpc 2.6.31-22.69
linux-image-2.6.31-22-powerpc-smp 2.6.31-22.69
linux-image-2.6.31-22-powerpc64-smp 2.6.31-22.69
linux-image-2.6.31-22-server 2.6.31-22.69
linux-image-2.6.31-22-sparc64 2.6.31-22.69
linux-image-2.6.31-22-sparc64-smp 2.6.31-22.69
linux-image-2.6.31-22-virtual 2.6.31-22.69
linux-image-2.6.31-307-ec2 2.6.31-307.22

Ubuntu 10.04 LTS:
linux-image-2.6.32-26-386 2.6.32-26.48
linux-image-2.6.32-26-generic 2.6.32-26.48
linux-image-2.6.32-26-generic-pae 2.6.32-26.48
linux-image-2.6.32-26-ia64 2.6.32-26.48
linux-image-2.6.32-26-lpia 2.6.32-26.48
linux-image-2.6.32-26-powerpc 2.6.32-26.48
linux-image-2.6.32-26-powerpc-smp 2.6.32-26.48
linux-image-2.6.32-26-powerpc64-smp 2.6.32-26.48
linux-image-2.6.32-26-preempt 2.6.32-26.48
linux-image-2.6.32-26-server 2.6.32-26.48
linux-image-2.6.32-26-sparc64 2.6.32-26.48
linux-image-2.6.32-26-sparc64-smp 2.6.32-26.48
linux-image-2.6.32-26-versatile 2.6.32-26.48
linux-image-2.6.32-26-virtual 2.6.32-26.48
linux-image-2.6.32-310-ec2 2.6.32-310.21

Ubuntu 10.10:
linux-image-2.6.35-23-generic 2.6.35-23.41
linux-image-2.6.35-23-generic-pae 2.6.35-23.41
linux-image-2.6.35-23-omap 2.6.35-23.41
linux-image-2.6.35-23-powerpc 2.6.35-23.41
linux-image-2.6.35-23-powerpc-smp 2.6.35-23.41
linux-image-2.6.35-23-powerpc64-smp 2.6.35-23.41
linux-image-2.6.35-23-server 2.6.35-23.41
linux-image-2.6.35-23-versatile 2.6.35-23.41
linux-image-2.6.35-23-virtual 2.6.35-23.41

After a standard system update you need to reboot your computer to make
all the necessary changes.

Details follow:

Nelson Elhage discovered several problems with the Acorn Econet protocol
driver. A local user could cause a denial of service via a NULL pointer
dereference, escalate privileges by overflowing the kernel stack, and
assign Econet addresses to arbitrary interfaces.