USN-2642-2: Linux kernel (Trusty HWE) regression

Ubuntu Security Notice USN-2642-2

21st June, 2015

linux-lts-trusty regression

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 12.04 LTS

Summary

The system could be made to crash under certain conditions.

Software description

  • linux-lts-trusty
    – Linux hardware enablement kernel from Trusty

Details

The Fix for CVE-2015-1328 introduced a regression into the Linux kernel’s
overlayfs file system. The removal of a directory that only exists on the
lower layer results in a kernel panic.

We apologize for the inconvenience.

Original advisory details:

Philip Pettersson discovered a privilege escalation when using overlayfs
mounts inside of user namespaces. A local user could exploit this flaw to
gain administrative privileges on the system.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 12.04 LTS:
linux-image-3.13.0-55-generic-lpae

3.13.0-55.94~precise1
linux-image-3.13.0-55-generic

3.13.0-55.94~precise1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

http://bugs.launchpad.net/bugs/1465998

USN-2643-2: Linux kernel regression

Ubuntu Security Notice USN-2643-2

21st June, 2015

linux regression

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.04 LTS

Summary

The system could be made to crash under certain conditions.

Software description

  • linux
    – Linux kernel

Details

The Fix for CVE-2015-1328 introduced a regression into the Linux kernel’s
overlayfs file system. The removal of a directory that only exists on the
lower layer results in a kernel panic.

We apologize for the inconvenience.

Original advisory details:

Philip Pettersson discovered a privilege escalation when using overlayfs
mounts inside of user namespaces. A local user could exploit this flaw to
gain administrative privileges on the system.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.04 LTS:
linux-image-3.13.0-55-generic-lpae

3.13.0-55.94
linux-image-3.13.0-55-generic

3.13.0-55.94
linux-image-3.13.0-55-powerpc-e500mc

3.13.0-55.94
linux-image-3.13.0-55-powerpc-smp

3.13.0-55.94
linux-image-3.13.0-55-powerpc64-emb

3.13.0-55.94
linux-image-3.13.0-55-powerpc-e500

3.13.0-55.94
linux-image-3.13.0-55-powerpc64-smp

3.13.0-55.94
linux-image-3.13.0-55-lowlatency

3.13.0-55.94

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

http://bugs.launchpad.net/bugs/1465998

USN-2644-2: Linux kernel (Utopic HWE) regression

Ubuntu Security Notice USN-2644-2

21st June, 2015

linux-lts-utopic regression

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.04 LTS

Summary

The system could be made to crash under certain conditions.

Software description

  • linux-lts-utopic
    – Linux hardware enablement kernel from Utopic

Details

The Fix for CVE-2015-1328 introduced a regression into the Linux kernel’s
overlayfs file system. The removal of a directory that only exists on the
lower layer results in a kernel panic.

We apologize for the inconvenience.

Original advisory details:

Philip Pettersson discovered a privilege escalation when using overlayfs
mounts inside of user namespaces. A local user could exploit this flaw to
gain administrative privileges on the system.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.04 LTS:
linux-image-3.16.0-41-powerpc-smp

3.16.0-41.57~14.04.1
linux-image-3.16.0-41-powerpc64-smp

3.16.0-41.57~14.04.1
linux-image-3.16.0-41-generic

3.16.0-41.57~14.04.1
linux-image-3.16.0-41-powerpc-e500mc

3.16.0-41.57~14.04.1
linux-image-3.16.0-41-generic-lpae

3.16.0-41.57~14.04.1
linux-image-3.16.0-41-lowlatency

3.16.0-41.57~14.04.1
linux-image-3.16.0-41-powerpc64-emb

3.16.0-41.57~14.04.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

http://bugs.launchpad.net/bugs/1465998

USN-2646-2: Linux kernel regression

Ubuntu Security Notice USN-2646-2

21st June, 2015

linux regression

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10

Summary

The system could be made to crash under certain conditions.

Software description

  • linux
    – Linux kernel

Details

The Fix for CVE-2015-1328 introduced a regression into the Linux kernel’s
overlayfs file system. The removal of a directory that only exists on the
lower layer results in a kernel panic.

We apologize for the inconvenience.

Original advisory details:

Philip Pettersson discovered a privilege escalation when using overlayfs
mounts inside of user namespaces. A local user could exploit this flaw to
gain administrative privileges on the system.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
linux-image-3.16.0-41-powerpc-smp

3.16.0-41.57
linux-image-3.16.0-41-powerpc64-smp

3.16.0-41.57
linux-image-3.16.0-41-powerpc64-emb

3.16.0-41.57
linux-image-3.16.0-41-powerpc-e500mc

3.16.0-41.57
linux-image-3.16.0-41-generic-lpae

3.16.0-41.57
linux-image-3.16.0-41-lowlatency

3.16.0-41.57
linux-image-3.16.0-41-generic

3.16.0-41.57

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

http://bugs.launchpad.net/bugs/1465998

Fedora 21 Security Update: cups-x2go-3.0.1.3-1.fc21

* New upstream version (3.0.1.2):
– cups-x2go{,.conf}: port to File::Temp. Use Text::ParseWords to split up the ps2pdf command line correctly. Don’t use system() but IPC::Open2::open2(). Capture the ps2pdf program’s stdout and write it to the temporary file handle “manually”. Should fix problems reported by Jan Bi on IRC.
– cups-x2go: fix commented out second ps2pdf definition to output PDF data to stdout.
* New upstream version (3.0.1.3):
– cups-x2go: import tempfile() function from File::Temp module.
– cups-x2go: only repeat the last X, not the whole “.pdfX” string (or the like.)
– cups-x2go: actually print “real” executed command instead of the “original” one with placeholders.
– cups-x2go: read output from ghostscript, don’t write a filehandle to the temporary file. Fixes a hanging ghostscript call and… well… random junk, instead of a “real” PDF file.
– cups-x2go: use parentheses around function arguments.
– cups-x2go: fix binmode() call, :raw layer is implicit.
– cups-x2go: fix print call… Does not allow to separate parameters with a comma.
– cups-x2go: add correct :raw layer to binmode calls.
– cups-x2go: fix tiny typo.
– cups-x2go: read data from GS and STDIN in chunks of 8 kbytes, instead of everything at once. Handles large print jobs gracefully.
– cups-x2go: add parentheses to close() calls.
– cups-x2go: delete PDF and title temporary files automatically.
– cups-x2go: unlink PS temporary file on-demand in END block. Also move closelog to END block, because we want to print diagnosis messages in the END block.
– cups-x2go: don’t use unlink() explicitly. Trust File::Temp and our END block to clean up correctly.
– cups-x2go: there is no continue in perl for stepping forward a loop. Still not. I keep forgetting that. Use next. (Partly) Fixes: #887.
– cups-x2go: use the same temp file template for PS, PDF and title files. Use appropriate suffixes if necessary when generating PDF and title temp files. (Fully) Fixes: #887.
Update to 3.0.1.1:
– Add a short README that provides some getting started information.
Update to 3.0.1.1:
– Add a short README that provides some getting started information.

Fedora 22 Security Update: cups-x2go-3.0.1.3-1.fc22

* New upstream version (3.0.1.2):
– cups-x2go{,.conf}: port to File::Temp. Use Text::ParseWords to split up the ps2pdf command line correctly. Don’t use system() but IPC::Open2::open2(). Capture the ps2pdf program’s stdout and write it to the temporary file handle “manually”. Should fix problems reported by Jan Bi on IRC.
– cups-x2go: fix commented out second ps2pdf definition to output PDF data to stdout.
* New upstream version (3.0.1.3):
– cups-x2go: import tempfile() function from File::Temp module.
– cups-x2go: only repeat the last X, not the whole “.pdfX” string (or the like.)
– cups-x2go: actually print “real” executed command instead of the “original” one with placeholders.
– cups-x2go: read output from ghostscript, don’t write a filehandle to the temporary file. Fixes a hanging ghostscript call and… well… random junk, instead of a “real” PDF file.
– cups-x2go: use parentheses around function arguments.
– cups-x2go: fix binmode() call, :raw layer is implicit.
– cups-x2go: fix print call… Does not allow to separate parameters with a comma.
– cups-x2go: add correct :raw layer to binmode calls.
– cups-x2go: fix tiny typo.
– cups-x2go: read data from GS and STDIN in chunks of 8 kbytes, instead of everything at once. Handles large print jobs gracefully.
– cups-x2go: add parentheses to close() calls.
– cups-x2go: delete PDF and title temporary files automatically.
– cups-x2go: unlink PS temporary file on-demand in END block. Also move closelog to END block, because we want to print diagnosis messages in the END block.
– cups-x2go: don’t use unlink() explicitly. Trust File::Temp and our END block to clean up correctly.
– cups-x2go: there is no continue in perl for stepping forward a loop. Still not. I keep forgetting that. Use next. (Partly) Fixes: #887.
– cups-x2go: use the same temp file template for PS, PDF and title files. Use appropriate suffixes if necessary when generating PDF and title temp files. (Fully) Fixes: #887.
Update to 3.0.1.1:
– Add a short README that provides some getting started information.
Update to 3.0.1.1:
– Add a short README that provides some getting started information.