Guerrilla SOA redux? PwC consultants recommend lighter, simpler, faster services to keep up with business demands. |
News
Tuesday, September 30, 2014
Through Microservices, a Renewed Push for Simplicity and IT Minimalism
Intel, Cisco, HP, Others Form NFV Consortium
The OPNFV will be a project at the Linux Foundation to create an open-source reference platform for NFV. |
More @
Arduino to Sell 3D Printer—$800 in Kit Form or $1,000 Pre-Assembled
Arduino Arduino, maker of the open source hardware platform of the same name, is teaming up with a startup called Sharebot to sell a 3D printer for about $1,000. Announced today, Materia 101 will be demonstrated at the Maker Faire in Rome this weekend. An on-sale date has not been revealed. |
More @
Piston’s McKenty to Leave Company He Founded for Pivotal
The New Stack: Josh McKenty, founder of Piston and an early architect of what became OpenStack, announced today that he's leaving the company he started to take on a new role at Pivotal. |
More @
Chromecast Getting Competition from Firefox OS-Powered Matchstick
The streaming stick market is apparently heating up. Google, Microsoft, and Amazon all have entrants in this space, and if a new Kickstarter appeal succeeds, there will soon be a Firefox OS stick getting in on the action. |
More @
Facebook has Over 200 Open Source Projects on GitHub
Facebook. It's one of the world's most well-known tech companies and on the forefront of open source technology. Just take a look their portfolio of over 200 open source projects on GitHub. In this interview with James Pearce, head of Open Source at Facebook, I speak with him prior to... |
More @
Distribution Release: CentOS 5.11
Johnny Hughes has announced the release of CentOS 5.11, the distribution's final release in the 5.x branch. |
More @
Apache Storm is Ready for Prime Time
Storm, a real-time framework for dealing with Big Data, has become an Apache top level project. |
More @
Scribbleton Has a Ton of Potential
Scribbleton is a very infant -- as in alpha -- release of an innovative note-taking app for Linux that provides cross-platform access with Windows and Apple computers. It creates a personal wiki for storing everything from quick notes to detailed checklists to outlines. It creates links between pages in Scribbleton. |
More @
eBay, PayPal Breakup an OpenStack Private Cloud Split Too
eBay and PayPal are both on the OpenStack bandwagon. The PayPal spin-off will highlight how easy or difficult it will be to break up an OpenStack private cloud. |
More @
VMware's Role in OpenStack: A Second Look
I had believed that VMware took part in the OpenStack community because it was dragged there by its customers. Boy, I was wrong. VMware's Dan Wendlandt helps set me straight. |
More @
Bringing Together a Disconnected Team
How do you connect remote workers together for better culture? |
More @
Fedora Might Try A New Scheduling Strategy For Its Releases
It's no secret that Fedora has had a challenging time sticking to their release schedules for a long time. With taking care of blocker bugs, Fedora Linux releases tend to frequently slip -- with Fedora 21 it's about two months behind schedule and we're just past the alpha stage. By... |
More @
Ten Fastest-Growing IT Skills Offer Opportunities
Baseline: If you want to move ahead in your career, it's important to command a skill that will enable you to write your own ticket in terms of job opportunities. |
More @
Open Sourcing Automation Tools for Testing Linux Images on Microsoft Azure
Openness at Microsft Blog: Microsoft has participated in the Linux community for several years now, contributing drivers for Hyper-V to the Linux kernel source code base, and then working with Linux distribution partners to incorporate those drivers into their distros. We've had great results in running a variety of Linux distros as a guest OS on Hyper-V and as a VM in Microsoft Azure, and our collaboration with SUSE... |
More @
NVIDIA GeForce GTX 980: The Best GPU For Linux Gamers
Earlier this month NVIDIA launched the GeForce GTX 970 and GTX 980 as their highest-end offerings based on their Maxwell architecture. Since the GTX 750 series debut I have been anxious to see Maxwell succeed Kepler in the high-end space and finally last week I got hands on time with... |
More @
Open Source Drives Innovation in Another Multi-Billion Dollar Market: World’s Largest Carriers, Vendors to Bring Virtualization
The Linux Foundation today is announcing a new Collaborative Project, Open Platform for NFV, or OPNFV. It involves nearly 40 companies and has largely been driven by end users like AT&T, China Mobile, NTT DOCOMO, Telecom Italia and Vodafone, among others. Together this community aims to build a carrier-grade, integrated, open source reference platform to accelerate Network Function Virtualization. |
More @
ubuntu-security-announce Digest, Vol 120, Issue 19
ubuntu-security-announce@lists.ubuntu.com
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com
You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com
When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."
Today's Topics:
1. [USN-2365-1] LibVNCServer vulnerabilities (Marc Deslauriers)
----------------------------------------------------------------------
Message: 1
Date: Mon, 29 Sep 2014 13:12:58 -0400
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2365-1] LibVNCServer vulnerabilities
Message-ID: <5429931A.1030100@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2365-1
September 29, 2014
libvncserver vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in LibVNCServer.
Software Description:
- libvncserver: vnc server library
Details:
Nicolas Ruff discovered that LibVNCServer incorrectly handled memory when
being advertised large screen sizes by the server. If a user were tricked
into connecting to a malicious server, an attacker could use this issue to
cause a denial of service, or possibly execute arbitrary code.
(CVE-2014-6051, CVE-2014-6052)
Nicolas Ruff discovered that LibVNCServer incorrectly handled large
ClientCutText messages. A remote attacker could use this issue to cause a
server to crash, resulting in a denial of service. (CVE-2014-6053)
Nicolas Ruff discovered that LibVNCServer incorrectly handled zero scaling
factor values. A remote attacker could use this issue to cause a server to
crash, resulting in a denial of service. (CVE-2014-6054)
Nicolas Ruff discovered that LibVNCServer incorrectly handled memory in the
file transfer feature. A remote attacker could use this issue to cause a
server to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2014-6055)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
libvncserver0 0.9.9+dfsg-1ubuntu1.1
Ubuntu 12.04 LTS:
libvncserver0 0.9.8.2-2ubuntu1.1
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2365-1
CVE-2014-6051, CVE-2014-6052, CVE-2014-6053, CVE-2014-6054,
CVE-2014-6055
Package Information:
https://launchpad.net/ubuntu/+source/libvncserver/0.9.9+dfsg-1ubuntu1.1
https://launchpad.net/ubuntu/+source/libvncserver/0.9.8.2-2ubuntu1.1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140929/4cdfc4be/attachment-0001.pgp>
------------------------------
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
End of ubuntu-security-announce Digest, Vol 120, Issue 19
*********************************************************
Monday, September 29, 2014
Protect yourself from the big bad shellshock
It has been announced on Wednesday, that a serious vulnerability has been found in the bash program installed on Linux, Unix and MacOSX systems. Because this bug is a hidden open-door to your system, hackers can gain access to your system from the internet, a run programs completely taking over the system. This is a serious problem, that if not handled quickly, and properly, will cause serious damage to your computer and Internet infrastructures since most of the computers servicing the Internet are running a Linux or Unix OS. Heed these warnings. Read these links thoroughly and make sure you update your Linux, Unix and MacOS X systems with the latest patch for bash. Start patching immediately. http://www.zdnet.com/shellshock-better-bash-patches-now-available-7000034115/ http://arstechnica.com/security/2014/09/bug-in-bash-shell-creates-big-security-hole-on-anything-with-nix-in-it/ |
More @
Web Software vs. Native Linux Software
Both Web-based software and Linux software offer significant costs savings. Is one actually better in the long term? |
More @
Tor Executive Director Hints at Firefox Integration
Daily Dot: Is this how the mainstream finally begins to win back its online privacy? |
More @
HP Unveils ARM-Based Moonshot Servers
The new systems ramp up ARM's competition with Intel and give data centers greater compute choices. |
More @
Eclipse Foundation Delivers Open IoT Stack for Java
The Eclipse IoT community is helping Java developers to connect and manage devices in an IoT solution by delivering an Open IoT Stack for Java. |
More @
The Internet Is Broken, and Shellshock Is Just the Start of Our Woes
The year was 1987, and as Fox drove cross-country to his new home, the tapes held a software program called Bash, a tool for the UNIX operating system he had written and tagged with a license that let anyone use the code and even redistribute it to others. |
More @
Improved Patch Tackles New Shellshock Bash Bug Attack Vectors
System administrators who spent last week making sure their computers are patched against Shellshock, a critical vulnerability in the Bash Unix command-line interpreter, will have to install a new patch that addresses additional attack vectors. |
More @
Cloudflare Just Added SSL Encryption to Two Million Websites for Free
Last year, the web optimization network CloudFlare promised it would double SSL usage on the web in 2014 — and last night, the company made good on its promise. Overnight, CloudFlare deployed its Universal SSL feature, offering free SSL encryption to any site that opted in. All told, that meant... |
More @
Shellshock Makes Heartbleed Look Insignificant
The new vulnerability in the Bash shell is the worst we've seen in many years. No software on critical systems can be assumed as safe. |
More @
Open, Open, Open: OpenDaylight Helium is Here
Everywhere you turn these days you hear the term "open" in networking. The idea of openness in networking has come a long way in the past year and it's now considered the de facto standard way that we'll achieve interoperability and innovation. |
More @
LibreSSL: More Than 30 Days Later
Ted Unangst has posted an update on LibreSSL development. "Joel and I have been working on a replacement API for OpenSSL, appropriately entitled ressl. Reimagined SSL is how I think of it. Our goals are consistency and simplicity. In particular, we answer the question 'What would the user like to... |
More @
Saturday, September 27, 2014
ubuntu-security-announce Digest, Vol 120, Issue 18
ubuntu-security-announce@lists.ubuntu.com
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com
You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com
When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."
Today's Topics:
1. [USN-2364-1] Bash vulnerabilities (Marc Deslauriers)
----------------------------------------------------------------------
Message: 1
Date: Sat, 27 Sep 2014 05:13:45 -0400
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2364-1] Bash vulnerabilities
Message-ID: <54267FC9.2080208@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2364-1
September 27, 2014
bash vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in Bash.
Software Description:
- bash: GNU Bourne Again SHell
Details:
Florian Weimer and Todd Sabin discovered that the Bash parser incorrectly
handled memory. An attacker could possibly use this issue to bypass certain
environment restrictions and execute arbitrary code. (CVE-2014-7186,
CVE-2014-7187)
In addition, this update introduces a hardening measure which adds prefixes
and suffixes around environment variable names which contain shell
functions.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
bash 4.3-7ubuntu1.4
Ubuntu 12.04 LTS:
bash 4.2-2ubuntu2.5
Ubuntu 10.04 LTS:
bash 4.1-2ubuntu3.4
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2364-1
CVE-2014-7186, CVE-2014-7187
Package Information:
https://launchpad.net/ubuntu/+source/bash/4.3-7ubuntu1.4
https://launchpad.net/ubuntu/+source/bash/4.2-2ubuntu2.5
https://launchpad.net/ubuntu/+source/bash/4.1-2ubuntu3.4
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140927/b69771a9/attachment-0001.pgp>
------------------------------
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
End of ubuntu-security-announce Digest, Vol 120, Issue 18
*********************************************************
Friday, September 26, 2014
ubuntu-security-announce Digest, Vol 120, Issue 17
ubuntu-security-announce@lists.ubuntu.com
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com
You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com
When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."
Today's Topics:
1. [USN-2363-1] Bash vulnerability (Marc Deslauriers)
2. [USN-2363-2] Bash vulnerability (Marc Deslauriers)
----------------------------------------------------------------------
Message: 1
Date: Thu, 25 Sep 2014 18:35:21 -0400
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2363-1] Bash vulnerability
Message-ID: <542498A9.6020900@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2363-1
September 25, 2014
bash vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
Bash allowed bypassing environment restrictions in certain environments.
Software Description:
- bash: GNU Bourne Again SHell
Details:
Tavis Ormandy discovered that the security fix for Bash included in
USN-2362-1 was incomplete. An attacker could use this issue to bypass
certain environment restrictions. (CVE-2014-7169)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
bash 4.3-7ubuntu1.2
Ubuntu 12.04 LTS:
bash 4.2-2ubuntu2.3
Ubuntu 10.04 LTS:
bash 4.1-2ubuntu3.2
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2363-1
CVE-2014-7169
Package Information:
https://launchpad.net/ubuntu/+source/bash/4.3-7ubuntu1.2
https://launchpad.net/ubuntu/+source/bash/4.2-2ubuntu2.3
https://launchpad.net/ubuntu/+source/bash/4.1-2ubuntu3.2
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140925/75d7bb69/attachment-0001.pgp>
------------------------------
Message: 2
Date: Thu, 25 Sep 2014 22:34:44 -0400
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2363-2] Bash vulnerability
Message-ID: <5424D0C4.9010404@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2363-2
September 26, 2014
bash vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
Bash allowed bypassing environment restrictions in certain environments.
Software Description:
- bash: GNU Bourne Again SHell
Details:
USN-2363-1 fixed a vulnerability in Bash. Due to a build issue, the patch
for CVE-2014-7169 didn't get properly applied in the Ubuntu 14.04 LTS
package. This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
Tavis Ormandy discovered that the security fix for Bash included in
USN-2362-1 was incomplete. An attacker could use this issue to bypass
certain environment restrictions. (CVE-2014-7169)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
bash 4.3-7ubuntu1.3
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2363-2
http://www.ubuntu.com/usn/usn-2363-1
CVE-2014-7169
Package Information:
https://launchpad.net/ubuntu/+source/bash/4.3-7ubuntu1.3
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140925/0d09f66e/attachment-0001.pgp>
------------------------------
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
End of ubuntu-security-announce Digest, Vol 120, Issue 17
*********************************************************
Thursday, September 25, 2014
ubuntu-security-announce Digest, Vol 120, Issue 16
ubuntu-security-announce@lists.ubuntu.com
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com
You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com
When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."
Today's Topics:
1. [USN-2362-1] Bash vulnerability (Marc Deslauriers)
2. [USN-2361-1] NSS vulnerability (Marc Deslauriers)
3. [USN-2360-2] Thunderbird vulnerabilities (Chris Coulson)
4. [USN-2360-1] Firefox vulnerabilities (Chris Coulson)
----------------------------------------------------------------------
Message: 1
Date: Wed, 24 Sep 2014 11:57:54 -0400
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2362-1] Bash vulnerability
Message-ID: <5422EA02.8080804@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2362-1
September 24, 2014
bash vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
Bash allowed bypassing environment restrictions in certain environments.
Software Description:
- bash: GNU Bourne Again SHell
Details:
Stephane Chazelas discovered that Bash incorrectly handled trailing code in
function definitions. An attacker could use this issue to bypass
environment restrictions, such as SSH forced command environments.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
bash 4.3-7ubuntu1.1
Ubuntu 12.04 LTS:
bash 4.2-2ubuntu2.2
Ubuntu 10.04 LTS:
bash 4.1-2ubuntu3.1
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2362-1
CVE-2014-6271
Package Information:
https://launchpad.net/ubuntu/+source/bash/4.3-7ubuntu1.1
https://launchpad.net/ubuntu/+source/bash/4.2-2ubuntu2.2
https://launchpad.net/ubuntu/+source/bash/4.1-2ubuntu3.1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140924/9506be98/attachment-0001.pgp>
------------------------------
Message: 2
Date: Wed, 24 Sep 2014 15:56:08 -0400
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2361-1] NSS vulnerability
Message-ID: <542321D8.4070300@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2361-1
September 24, 2014
nss vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
Fraudulent security certificates could allow sensitive information to
be exposed when accessing the Internet.
Software Description:
- nss: Network Security Service library
Details:
Antoine Delignat-Lavaud and others discovered that NSS incorrectly handled
parsing ASN.1 values. An attacker could use this issue to forge RSA
certificates.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
libnss3 2:3.17.1-0ubuntu0.14.04.1
Ubuntu 12.04 LTS:
libnss3 3.17.1-0ubuntu0.12.04.1
Ubuntu 10.04 LTS:
libnss3-1d 3.17.1-0ubuntu0.10.04.1
This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any applications
that use NSS, such as Evolution and Chromium, to make all the necessary
changes.
References:
http://www.ubuntu.com/usn/usn-2361-1
CVE-2014-1568
Package Information:
https://launchpad.net/ubuntu/+source/nss/2:3.17.1-0ubuntu0.14.04.1
https://launchpad.net/ubuntu/+source/nss/3.17.1-0ubuntu0.12.04.1
https://launchpad.net/ubuntu/+source/nss/3.17.1-0ubuntu0.10.04.1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140924/1ed2dc73/attachment-0001.pgp>
------------------------------
Message: 3
Date: Wed, 24 Sep 2014 20:38:13 +0100
From: Chris Coulson <chris.coulson@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2360-2] Thunderbird vulnerabilities
Message-ID: <54231DA5.5070005@canonical.com>
Content-Type: text/plain; charset="windows-1252"
==========================================================================
Ubuntu Security Notice USN-2360-2
September 24, 2014
thunderbird vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Fraudulent security certificates could allow sensitive information to
be exposed when accessing the Internet.
Software Description:
- thunderbird: Mozilla Open Source mail and newsgroup client
Details:
USN-2360-1 fixed vulnerabilities in Firefox. This update provides the
corresponding updates for Thunderbird.
Original advisory details:
Antoine Delignat-Lavaud and others discovered that NSS incorrectly handled
parsing ASN.1 values. An attacker could use this issue to forge RSA
certificates.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
thunderbird 1:31.1.2+build1-0ubuntu0.14.04.1
Ubuntu 12.04 LTS:
thunderbird 1:31.1.2+build1-0ubuntu0.12.04.1
After a standard system update you need to restart Thunderbird to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2360-2
http://www.ubuntu.com/usn/usn-2360-1
CVE-2014-1568
Package Information:
https://launchpad.net/ubuntu/+source/thunderbird/1:31.1.2+build1-0ubuntu0.14.04.1
https://launchpad.net/ubuntu/+source/thunderbird/1:31.1.2+build1-0ubuntu0.12.04.1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 473 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140924/93a957d9/attachment-0001.pgp>
------------------------------
Message: 4
Date: Wed, 24 Sep 2014 20:31:30 +0100
From: Chris Coulson <chris.coulson@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2360-1] Firefox vulnerabilities
Message-ID: <54231C12.4060906@canonical.com>
Content-Type: text/plain; charset="windows-1252"
==========================================================================
Ubuntu Security Notice USN-2360-1
September 24, 2014
firefox vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Fraudulent security certificates could allow sensitive information to
be exposed when accessing the Internet.
Software Description:
- firefox: Mozilla Open Source web browser
Details:
Antoine Delignat-Lavaud and others discovered that NSS incorrectly handled
parsing ASN.1 values. An attacker could use this issue to forge RSA
certificates.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
firefox 32.0.3+build1-0ubuntu0.14.04.1
Ubuntu 12.04 LTS:
firefox 32.0.3+build1-0ubuntu0.12.04.1
After a standard system update you need to restart Firefox to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2360-1
CVE-2014-1568
Package Information:
https://launchpad.net/ubuntu/+source/firefox/32.0.3+build1-0ubuntu0.14.04.1
https://launchpad.net/ubuntu/+source/firefox/32.0.3+build1-0ubuntu0.12.04.1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 473 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140924/f82003eb/attachment-0001.pgp>
------------------------------
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
End of ubuntu-security-announce Digest, Vol 120, Issue 16
*********************************************************
Wednesday, September 24, 2014
Microsoft VP Scott Charney Architect of Trustworthy Computing Changes
View on Mobile Phone | View as Web page |
|
Contact Us
About the commentary -- letters@windowsitpro.com
About technical questions -- forums.windowsitpro.com
About product news -- products@windowsitpro.com
About advertising -- michelle.andrews@penton.com
You are subscribed as: boy.blogger@gmail.com. To unsubscribe, click here.
ubuntu-security-announce Digest, Vol 120, Issue 15
ubuntu-security-announce@lists.ubuntu.com
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com
You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com
When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."
Today's Topics:
1. [USN-2359-1] Linux kernel vulnerabilities (John Johansen)
----------------------------------------------------------------------
Message: 1
Date: Tue, 23 Sep 2014 15:06:33 -0700
From: John Johansen <john.johansen@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2359-1] Linux kernel vulnerabilities
Message-ID: <5421EEE9.1050009@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2359-1
September 23, 2014
linux vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux: Linux kernel
Details:
Jack Morgenstein reported a flaw in the page handling of the KVM (Kerenl
Virtual Machine) subsystem in the Linux kernel. A guest OS user could
exploit this flaw to cause a denial of service (host OS memory corruption)
or possibly have other unspecified impact on the host OS. (CVE-2014-3601)
Jason Gunthorpe reported a flaw with SCTP authentication in the Linux
kernel. A remote attacker could exploit this flaw to cause a denial of
service (NULL pointer dereference and OOPS). (CVE-2014-5077)
Chris Evans reported an flaw in the Linux kernel's handling of iso9660
(compact disk filesystem) images. An attacker who can mount a custom
iso9660 image either via a CD/DVD drive or a loopback mount could cause a
denial of service (system crash or reboot). (CVE-2014-5471)
Chris Evans reported an flaw in the Linux kernel's handling of iso9660
(compact disk filesystem) images. An attacker who can mount a custom
iso9660 image, with a self-referential CL entry, either via a CD/DVD drive
or a loopback mount could cause a denial of service (unkillable mount
process). (CVE-2014-5472)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
linux-image-3.13.0-36-generic 3.13.0-36.63
linux-image-3.13.0-36-generic-lpae 3.13.0-36.63
linux-image-3.13.0-36-lowlatency 3.13.0-36.63
linux-image-3.13.0-36-powerpc-e500 3.13.0-36.63
linux-image-3.13.0-36-powerpc-e500mc 3.13.0-36.63
linux-image-3.13.0-36-powerpc-smp 3.13.0-36.63
linux-image-3.13.0-36-powerpc64-emb 3.13.0-36.63
linux-image-3.13.0-36-powerpc64-smp 3.13.0-36.63
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-2359-1
CVE-2014-3601, CVE-2014-5077, CVE-2014-5471, CVE-2014-5472
Package Information:
https://launchpad.net/ubuntu/+source/linux/3.13.0-36.63
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140923/ed540319/attachment-0001.pgp>
------------------------------
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
End of ubuntu-security-announce Digest, Vol 120, Issue 15
*********************************************************
Tuesday, September 23, 2014
ubuntu-security-announce Digest, Vol 120, Issue 14
ubuntu-security-announce@lists.ubuntu.com
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com
You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com
When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."
Today's Topics:
1. [USN-2353-1] APT vulnerability (Marc Deslauriers)
2. [USN-2354-1] Linux kernel vulnerabilities (John Johansen)
3. [USN-2355-1] Linux kernel (EC2) vulnerabilities (John Johansen)
4. [USN-2356-1] Linux kernel vulnerabilities (John Johansen)
5. [USN-2357-1] Linux kernel (OMAP4) vulnerabilities (John Johansen)
6. [USN-2358-1] Linux kernel (Trusty HWE) vulnerabilities
(John Johansen)
----------------------------------------------------------------------
Message: 1
Date: Tue, 23 Sep 2014 12:38:49 -0400
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2353-1] APT vulnerability
Message-ID: <5421A219.3020005@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2353-1
September 23, 2014
apt vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
APT could be made to crash or run programs if it received specially crafted
network traffic.
Software Description:
- apt: Advanced front-end for dpkg
Details:
It was discovered that APT incorrectly handled certain http URLs. If a
remote attacker were able to perform a man-in-the-middle attack, this flaw
could be exploited to cause APT to crash, resulting in a denial of service,
or possibly execute arbitrary code. (CVE-2014-6273)
In addition, this update fixes regressions introduced by the USN-2348-1
security update: APT incorrectly handled file:/// sources on a different
partition, incorrectly handled Dir::state::lists set to a relative path,
and incorrectly handled cdrom: sources.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
apt 1.0.1ubuntu2.4.1
Ubuntu 12.04 LTS:
apt 0.8.16~exp12ubuntu10.20.1
Ubuntu 10.04 LTS:
apt 0.7.25.3ubuntu9.17.1
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2353-1
CVE-2014-6273
Package Information:
https://launchpad.net/ubuntu/+source/apt/1.0.1ubuntu2.4.1
https://launchpad.net/ubuntu/+source/apt/0.8.16~exp12ubuntu10.20.1
https://launchpad.net/ubuntu/+source/apt/0.7.25.3ubuntu9.17.1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140923/0dce380a/attachment-0001.pgp>
------------------------------
Message: 2
Date: Tue, 23 Sep 2014 14:52:39 -0700
From: John Johansen <john.johansen@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2354-1] Linux kernel vulnerabilities
Message-ID: <5421EBA7.5050504@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2354-1
September 23, 2014
linux vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux: Linux kernel
Details:
Chris Evans reported an flaw in the Linux kernel's handling of iso9660
(compact disk filesystem) images. An attacker who can mount a custom
iso9660 image either via a CD/DVD drive or a loopback mount could cause a
denial of service (system crash or reboot). (CVE-2014-5471)
Chris Evans reported an flaw in the Linux kernel's handling of iso9660
(compact disk filesystem) images. An attacker who can mount a custom
iso9660 image, with a self-referential CL entry, either via a CD/DVD drive
or a loopback mount could cause a denial of service (unkillable mount
process). (CVE-2014-5472)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 10.04 LTS:
linux-image-2.6.32-66-386 2.6.32-66.132
linux-image-2.6.32-66-generic 2.6.32-66.132
linux-image-2.6.32-66-generic-pae 2.6.32-66.132
linux-image-2.6.32-66-ia64 2.6.32-66.132
linux-image-2.6.32-66-lpia 2.6.32-66.132
linux-image-2.6.32-66-powerpc 2.6.32-66.132
linux-image-2.6.32-66-powerpc-smp 2.6.32-66.132
linux-image-2.6.32-66-powerpc64-smp 2.6.32-66.132
linux-image-2.6.32-66-preempt 2.6.32-66.132
linux-image-2.6.32-66-server 2.6.32-66.132
linux-image-2.6.32-66-sparc64 2.6.32-66.132
linux-image-2.6.32-66-sparc64-smp 2.6.32-66.132
linux-image-2.6.32-66-versatile 2.6.32-66.132
linux-image-2.6.32-66-virtual 2.6.32-66.132
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-2354-1
CVE-2014-5471, CVE-2014-5472
Package Information:
https://launchpad.net/ubuntu/+source/linux/2.6.32-66.132
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140923/069be072/attachment-0001.pgp>
------------------------------
Message: 3
Date: Tue, 23 Sep 2014 14:58:33 -0700
From: John Johansen <john.johansen@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2355-1] Linux kernel (EC2) vulnerabilities
Message-ID: <5421ED09.4040209@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2355-1
September 23, 2014
linux-ec2 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux-ec2: Linux kernel for EC2
Details:
Chris Evans reported an flaw in the Linux kernel's handling of iso9660
(compact disk filesystem) images. An attacker who can mount a custom
iso9660 image either via a CD/DVD drive or a loopback mount could cause a
denial of service (system crash or reboot). (CVE-2014-5471)
Chris Evans reported an flaw in the Linux kernel's handling of iso9660
(compact disk filesystem) images. An attacker who can mount a custom
iso9660 image, with a self-referential CL entry, either via a CD/DVD drive
or a loopback mount could cause a denial of service (unkillable mount
process). (CVE-2014-5472)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 10.04 LTS:
linux-image-2.6.32-370-ec2 2.6.32-370.86
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-2355-1
CVE-2014-5471, CVE-2014-5472
Package Information:
https://launchpad.net/ubuntu/+source/linux-ec2/2.6.32-370.86
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140923/bed884f1/attachment-0001.pgp>
------------------------------
Message: 4
Date: Tue, 23 Sep 2014 14:59:31 -0700
From: John Johansen <john.johansen@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2356-1] Linux kernel vulnerabilities
Message-ID: <5421ED43.6060204@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2356-1
September 23, 2014
linux vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux: Linux kernel
Details:
Jack Morgenstein reported a flaw in the page handling of the KVM (Kerenl
Virtual Machine) subsystem in the Linux kernel. A guest OS user could
exploit this flaw to cause a denial of service (host OS memory corruption)
or possibly have other unspecified impact on the host OS. (CVE-2014-3601)
Chris Evans reported an flaw in the Linux kernel's handling of iso9660
(compact disk filesystem) images. An attacker who can mount a custom
iso9660 image either via a CD/DVD drive or a loopback mount could cause a
denial of service (system crash or reboot). (CVE-2014-5471)
Chris Evans reported an flaw in the Linux kernel's handling of iso9660
(compact disk filesystem) images. An attacker who can mount a custom
iso9660 image, with a self-referential CL entry, either via a CD/DVD drive
or a loopback mount could cause a denial of service (unkillable mount
process). (CVE-2014-5472)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.2.0-69-generic 3.2.0-69.103
linux-image-3.2.0-69-generic-pae 3.2.0-69.103
linux-image-3.2.0-69-highbank 3.2.0-69.103
linux-image-3.2.0-69-omap 3.2.0-69.103
linux-image-3.2.0-69-powerpc-smp 3.2.0-69.103
linux-image-3.2.0-69-powerpc64-smp 3.2.0-69.103
linux-image-3.2.0-69-virtual 3.2.0-69.103
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-2356-1
CVE-2014-3601, CVE-2014-5471, CVE-2014-5472
Package Information:
https://launchpad.net/ubuntu/+source/linux/3.2.0-69.103
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140923/1e37f4d9/attachment-0001.pgp>
------------------------------
Message: 5
Date: Tue, 23 Sep 2014 15:00:07 -0700
From: John Johansen <john.johansen@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2357-1] Linux kernel (OMAP4) vulnerabilities
Message-ID: <5421ED67.8070001@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2357-1
September 23, 2014
linux-ti-omap4 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux-ti-omap4: Linux kernel for OMAP4
Details:
Jack Morgenstein reported a flaw in the page handling of the KVM (Kerenl
Virtual Machine) subsystem in the Linux kernel. A guest OS user could
exploit this flaw to cause a denial of service (host OS memory corruption)
or possibly have other unspecified impact on the host OS. (CVE-2014-3601)
Chris Evans reported an flaw in the Linux kernel's handling of iso9660
(compact disk filesystem) images. An attacker who can mount a custom
iso9660 image either via a CD/DVD drive or a loopback mount could cause a
denial of service (system crash or reboot). (CVE-2014-5471)
Chris Evans reported an flaw in the Linux kernel's handling of iso9660
(compact disk filesystem) images. An attacker who can mount a custom
iso9660 image, with a self-referential CL entry, either via a CD/DVD drive
or a loopback mount could cause a denial of service (unkillable mount
process). (CVE-2014-5472)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.2.0-1453-omap4 3.2.0-1453.73
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-2357-1
CVE-2014-3601, CVE-2014-5471, CVE-2014-5472
Package Information:
https://launchpad.net/ubuntu/+source/linux-ti-omap4/3.2.0-1453.73
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140923/b9b4fa86/attachment-0001.pgp>
------------------------------
Message: 6
Date: Tue, 23 Sep 2014 15:01:35 -0700
From: John Johansen <john.johansen@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2358-1] Linux kernel (Trusty HWE) vulnerabilities
Message-ID: <5421EDBF.4050806@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2358-1
September 23, 2014
linux-lts-trusty vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux-lts-trusty: Linux hardware enablement kernel from Trusty
Details:
Jack Morgenstein reported a flaw in the page handling of the KVM (Kerenl
Virtual Machine) subsystem in the Linux kernel. A guest OS user could
exploit this flaw to cause a denial of service (host OS memory corruption)
or possibly have other unspecified impact on the host OS. (CVE-2014-3601)
Jason Gunthorpe reported a flaw with SCTP authentication in the Linux
kernel. A remote attacker could exploit this flaw to cause a denial of
service (NULL pointer dereference and OOPS). (CVE-2014-5077)
Chris Evans reported an flaw in the Linux kernel's handling of iso9660
(compact disk filesystem) images. An attacker who can mount a custom
iso9660 image either via a CD/DVD drive or a loopback mount could cause a
denial of service (system crash or reboot). (CVE-2014-5471)
Chris Evans reported an flaw in the Linux kernel's handling of iso9660
(compact disk filesystem) images. An attacker who can mount a custom
iso9660 image, with a self-referential CL entry, either via a CD/DVD drive
or a loopback mount could cause a denial of service (unkillable mount
process). (CVE-2014-5472)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.13.0-36-generic 3.13.0-36.63~precise1
linux-image-3.13.0-36-generic-lpae 3.13.0-36.63~precise1
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-2358-1
CVE-2014-3601, CVE-2014-5077, CVE-2014-5471, CVE-2014-5472
Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-trusty/3.13.0-36.63~precise1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140923/de1dec07/attachment.pgp>
------------------------------
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
End of ubuntu-security-announce Digest, Vol 120, Issue 14
*********************************************************
Blog Archive
-
▼
2014
(407)
-
▼
September
(48)
- Through Microservices, a Renewed Push for Simplici...
- Intel, Cisco, HP, Others Form NFV Consortium
- Arduino to Sell 3D Printer—$800 in Kit Form or $1,...
- Piston’s McKenty to Leave Company He Founded for P...
- Chromecast Getting Competition from Firefox OS-Pow...
- Facebook has Over 200 Open Source Projects on GitHub
- Distribution Release: CentOS 5.11
- Apache Storm is Ready for Prime Time
- Scribbleton Has a Ton of Potential
- eBay, PayPal Breakup an OpenStack Private Cloud Sp...
- VMware's Role in OpenStack: A Second Look
- Bringing Together a Disconnected Team
- Fedora Might Try A New Scheduling Strategy For Its...
- Ten Fastest-Growing IT Skills Offer Opportunities
- Open Sourcing Automation Tools for Testing Linux I...
- NVIDIA GeForce GTX 980: The Best GPU For Linux Gamers
- Open Source Drives Innovation in Another Multi-Bil...
- ubuntu-security-announce Digest, Vol 120, Issue 19
- Protect yourself from the big bad shellshock
- Web Software vs. Native Linux Software
- Tor Executive Director Hints at Firefox Integration
- HP Unveils ARM-Based Moonshot Servers
- Eclipse Foundation Delivers Open IoT Stack for Java
- The Internet Is Broken, and Shellshock Is Just the...
- Improved Patch Tackles New Shellshock Bash Bug Att...
- Cloudflare Just Added SSL Encryption to Two Millio...
- Shellshock Makes Heartbleed Look Insignificant
- Open, Open, Open: OpenDaylight Helium is Here
- LibreSSL: More Than 30 Days Later
- ubuntu-security-announce Digest, Vol 120, Issue 18
- ubuntu-security-announce Digest, Vol 120, Issue 17
- ubuntu-security-announce Digest, Vol 120, Issue 16
- Microsoft VP Scott Charney Architect of Trustworth...
- ubuntu-security-announce Digest, Vol 120, Issue 15
- ubuntu-security-announce Digest, Vol 120, Issue 14
- ubuntu-security-announce Digest, Vol 120, Issue 13
- ubuntu-security-announce Digest, Vol 120, Issue 12
- ubuntu-security-announce Digest, Vol 120, Issue 11
- ubuntu-security-announce Digest, Vol 120, Issue 10
- ubuntu-security-announce Digest, Vol 120, Issue 9
- ubuntu-security-announce Digest, Vol 120, Issue 8
- ubuntu-security-announce Digest, Vol 120, Issue 7
- ubuntu-security-announce Digest, Vol 120, Issue 6
- ubuntu-security-announce Digest, Vol 120, Issue 5
- ubuntu-security-announce Digest, Vol 120, Issue 4
- ubuntu-security-announce Digest, Vol 120, Issue 3
- ubuntu-security-announce Digest, Vol 120, Issue 2
- ubuntu-security-announce Digest, Vol 120, Issue 1
-
▼
September
(48)