Ubuntu Linux Distribution, Canonical fixes kernel Vulnerability, Report

Ubuntu Linux distribution, Canonical fixes kernel vulnerability, report
Canonical has just posted a security advisory for Ubuntu users. New kernel versions are available to correct a security vulnerability. It affects all versions of the supported Linux distribution.

This update is not very “big” however it brings a correction to a problem deemed important. It fixes a recent security breach.
The bug allows a malicious person to crash the system or run programs as a root administrator.

The versions of Ubuntu concerned are Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 16.10. Canonical says
“A local attacker can use this vulnerability to cause a denial of service (system crash) or execute arbitrary code with administrator privileges”

Users are naturally strongly urged to update their system as quickly as possible.

Ubuntu, new kernels are available

Canonical points out that this problem is corrected if the user updates his system through the latest kernel versions now available in stable “repositories”. There are thus four versions, namely

Linux-image 3.2.0.125.140 is for Ubuntu 12.04 LTS (Precise Pangolin),
Linux-image 3.13.0.115.125 to Ubuntu 14.04 LTS (Trusty Tahr),
Linux-image 4.4.0.71.77 to Ubuntu 16.04 LTS Xenial Xerus)
And Linux-image 4.8.0.45.57 to Ubuntu 16.10 (Yakkety Yak).

In parallel new HWE cores (Hardware Enablement) are proposed for Ubuntu 12.04.5 LTS (Linux-image 3.13.0-115.162 ~ precise1), for Ubuntu 14.04.5 LTS (Linux-image 4.4.0-71.92 ~ 14.04.1 ) And Ubuntu 16.04.2 LTS (Linux-image 4.8.0-45.48 ~ 16.04.1). This also applies to Raspberry Pi 2, AWS and GKE systems.

Normally users of the Ubuntu desktop distribution are notified every day of the availability of security updates and every week of Update’s existence not related to security.

The automatic installation of updates is configurable through the “Update Manager”. To launch it, simply run the duet “Alt + F2” to go to the Settings. You can find all the information in the Ubuntu Wiki .