New vulnerabilities detected in Ubuntu

Tux on green background of ones and zeros

New security flaw detected in Ubuntu systems, this time they have to do with the Linux Kernel they use and with which the attackers could deny the service and steal privileged information

A few days ago, we had published a news story in which it said that sand vulnerabilities had been detected en Ubuntu operating systems, because these days another security failure classified as serious has been detected.

The security error this time is a vulnerability in the Linux Kernel of the following versions of Ubuntu: Ubuntu 14.04 LTS Trusty Tahr and Ubuntu 15.04 Vivid Velvet. There were exactly two bugs in each version and they were discovered by users. Fortunately, they have already been corrected making it necessary to update

In version 14.04, the bugs were discovered a couple of days ago and they were as follows.

  • User Benjamin Randazzo discovered that a local user could escalate privileges and steal private information through the kernel due to a multi-system controller failure.
  • Marc-André Lureau has discovered that the Linux Kernel of this version I had not reserved or limited the space that can occupy the file where the registry is saved, then the system service could be denied with a DoS attack on this file.

In version 15.04, they have been discovered a few hours ago, They are very similar to those offered by version 14.04 and they were discovered by the same users.

  • Benjamin Randazzo detected a information leak in the kernel Due to the failure of the Linux kernel multisystem driver, thanks to this a user can steal private information.
  • Marc-André Lureau discovered that the same failure that he discovered in version 14.04 LTS was also produced here, that is, no space was reserved for the log file, so a denial of service could be made.

Of course these vulnerabilities affect all versions of Ubuntu, whether they are Ubuntu, Lubuntu, Edubuntu, Xubuntu ... and we must update immediately for greater security.

To do this, we will access the command console and type the classic command sudo apt-get-update and sudo apt-get upgradeIn this way we will be safe from attackers.