Fedora 21 Security Update: kernel-3.19.7-200.fc21

Resolved Bugs
1218074 – CVE-2015-3636 kernel: ping sockets: use-after-free leading to local privilege escalation
1218110 – CVE-2015-3636 kernel: ping sockets: use-after-free leading to local privilege escalation [fedora-all]
1218662 – I/O errors, broken ncq trim since Samsung SSD update EXT0DB6Q
1208999 – iscsi issues on 3.19 kernel
1204390 – [abrt] WARNING: CPU: 6 PID: 790 at drivers/media/v4l2-core/v4l2-ioctl.c:1025 v4l_querycap+0x41/0x70 [videodev]() [videodev]
1206036 – Impossible to reduce the display brightness under the new kernel – Toshiba Z30 laptop
1215989 – Backlight is non-responsive on Toshiba Satellite
1205083 – [abrt] WARNING: CPU: 3 PID: 644 at drivers/net/wireless/iwlwifi/mvm/tx.c:952 iwl_mvm_rx_ba_notif+0x525/0x5c0 [iwlmvm]() [iwlmvm]
1214030 – CVE-2015-3339 kernel: race condition between chown() and execve()<br
The 3.19.7 update contains an number of important fixes across the tree.
The 3.19.6 stable update contains an number of fixes across the kernel tree

Fedora 22 Security Update: php-ZendFramework2-2.3.8-1.fc22

* **ZF2015-04**: ZendMail and ZendHttp were both susceptible to CRLF Injection Attack vectors (for HTTP, this is often referred to as HTTP Response Splitting). Both components were updated to perform header value validations to ensure no values contain characters not detailed in their corresponding specifications, and will raise exceptions on detection. Each also provides new facilities for both validating and filtering header values prior to injecting them into header classes. If you use either ZendMail or ZendHttp (which includes users of ZendMvc), we recommend upgrading immediately.

Fedora 20 Security Update: ca-certificates-2015.2.4-1.0.fc20

This is an update to the set of CA certificates released with NSS version 3.18.1
However, the package modifies the CA list to keep several legacy CAs still trusted for compatibility reasons. Please refer to the project URL for details.
If you prefer to use the unchanged list provided by Mozilla, and if you accept any compatibility issues it may cause, an administrator may configure the system by executing the “ca-legacy disable” command.
This update adds a manual page for the ca-legacy command.
This update changes the names of the possible values in the ca-legacy configuration file. It still uses the term legacy=disable to override the compatibility option and follow the upstream Mozilla.org decision. However it now uses the term legacy=default for the default configuration, to make it more obvious that the legacy certificates won’t be kept enabled forever.

Fedora 21 Security Update: php-ZendFramework2-2.3.8-1.fc21

* **ZF2015-04**: ZendMail and ZendHttp were both susceptible to CRLF Injection Attack vectors (for HTTP, this is often referred to as HTTP Response Splitting). Both components were updated to perform header value validations to ensure no values contain characters not detailed in their corresponding specifications, and will raise exceptions on detection. Each also provides new facilities for both validating and filtering header values prior to injecting them into header classes. If you use either ZendMail or ZendHttp (which includes users of ZendMvc), we recommend upgrading immediately.

DSA-3255 zeromq3 – security update

It was discovered that libzmq, a lightweight messaging kernel, is
susceptible to a protocol downgrade attack on sockets using the ZMTP v3
protocol. This could allow remote attackers to bypass ZMTP v3 security
mechanisms by sending ZMTP v2 or earlier headers.

DSA-3256 libtasn1-6 – security update

Hanno Boeck discovered a heap-based buffer overflow flaw in the way
Libtasn1, a library to manage ASN.1 structures, decoded certain
DER-encoded input. A specially crafted DER-encoded input could cause an
application using the Libtasn1 library to crash, or potentially to
execute arbitrary code.

USN-2597-2: Linux kernel (Trusty HWE) regression

Ubuntu Security Notice USN-2597-2

8th May, 2015

linux-lts-trusty vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 12.04 LTS

Summary

USN-2597-1 Introduced a regression in the Linux kernel.

Software description

  • linux-lts-trusty
    – Linux hardware enablement kernel from Trusty

Details

USN-2597-1 fixed vulnerabilities in the Linux kernel, however an unrelated
regression in the auditing of some path names was introduced. Due to the
regression the system could crash under certain conditions.

This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

A race condition between chown() and execve() was discovered in the Linux
kernel. A local attacker could exploit this race by using chown on a
setuid-user-binary to gain administrative privileges.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 12.04 LTS:
linux-image-3.13.0-52-generic

3.13.0-52.86~precise1
linux-image-3.13.0-52-generic-lpae

3.13.0-52.86~precise1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

https://launchpad.net/bugs/XXXXXX

USN-2598-2: Linux kernel regression

Ubuntu Security Notice USN-2598-2

8th May, 2015

linux vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.04 LTS

Summary

USN-2598-1 Introduced a regression in the Linux kernel.

Software description

  • linux
    – Linux kernel

Details

USN-2598-1 fixed vulnerabilities in the Linux kernel, however an unrelated
regression in the auditing of some path names was introduced. Due to the
regression the system could crash under certain conditions.

This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

A race condition between chown() and execve() was discovered in the Linux
kernel. A local attacker could exploit this race by using chown on a
setuid-user-binary to gain administrative privileges.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.04 LTS:
linux-image-3.13.0-52-generic

3.13.0-52.86
linux-image-3.13.0-52-generic-lpae

3.13.0-52.86
linux-image-3.13.0-52-powerpc-e500

3.13.0-52.86
linux-image-3.13.0-52-lowlatency

3.13.0-52.86
linux-image-3.13.0-52-powerpc-smp

3.13.0-52.86
linux-image-3.13.0-52-powerpc-e500mc

3.13.0-52.86
linux-image-3.13.0-52-powerpc64-emb

3.13.0-52.86
linux-image-3.13.0-52-powerpc64-smp

3.13.0-52.86

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

LP: 1450442

USN-2599-2: Linux kernel (Utopic HWE) vulnerability

Ubuntu Security Notice USN-2599-2

8th May, 2015

linux-lts-utopic vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.04 LTS

Summary

USN-2599-1 Introduced a regression in the Linux kernel.

Software description

  • linux-lts-utopic
    – Linux hardware enablement kernel from Utopic

Details

USN-2599-1 fixed vulnerabilities in the Linux kernel, however an unrelated
regression in the auditing of some path names was introduced. Due to the
regression the system could crash under certain conditions.

This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

A race condition between chown() and execve() was discovered in the Linux
kernel. A local attacker could exploit this race by using chown on a
setuid-user-binary to gain administrative privileges.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.04 LTS:
linux-image-3.16.0-37-generic

3.16.0-37.51~14.04.1
linux-image-3.16.0-37-lowlatency

3.16.0-37.51~14.04.1
linux-image-3.16.0-37-powerpc64-emb

3.16.0-37.51~14.04.1
linux-image-3.16.0-37-powerpc64-smp

3.16.0-37.51~14.04.1
linux-image-3.16.0-37-generic-lpae

3.16.0-37.51~14.04.1
linux-image-3.16.0-37-powerpc-smp

3.16.0-37.51~14.04.1
linux-image-3.16.0-37-powerpc-e500mc

3.16.0-37.51~14.04.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

LP: 1450442