A PHP Error was encountered

Severity: Warning

Message: fopen(/var/lib/php/sessions/ci_sessionpi4chsjndhra5lstjr2o0cbobl6qssft): failed to open stream: No space left on device

Filename: drivers/Session_files_driver.php

Line Number: 176

Backtrace:

File: /var/www/html/application/core/MY_Controller.php
Line: 8
Function: __construct

File: /var/www/html/application/controllers/Frontend.php
Line: 10
Function: __construct

File: /var/www/html/index.php
Line: 315
Function: require_once

A PHP Error was encountered

Severity: Warning

Message: session_start(): Failed to read session data: user (path: /var/lib/php/sessions)

Filename: Session/Session.php

Line Number: 143

Backtrace:

File: /var/www/html/application/core/MY_Controller.php
Line: 8
Function: __construct

File: /var/www/html/application/controllers/Frontend.php
Line: 10
Function: __construct

File: /var/www/html/index.php
Line: 315
Function: require_once

Advisory for Ubuntu Packages Security Update


Advisory for Ubuntu Packages Security Update

  • NIC-CERT/2022-08/366
  • Date: 2022-08-31
  • CVE ID: Multiple
  • Severity: High

Description:
Multiple vulnerabilities have been reported in multiple Ubuntu packages which could allow an attackerto take control of the affected system.

Security Issues Fixed:
Ubuntu has released an advisory for multiple packages which contains vulnerabilities in SDL, Schroot.


Affected Package and Solution:

Affected Package

CVE IDs

Updated Version

libsdl1.2 - Simple DirectMedia Layer

CVE-2022-34568

Ubuntu 16.04

schroot - Execute commands in a chroot environment

CVE-2022-2787

Ubuntu 22.04

Ubuntu 20.04

Ubuntu 18.04

Ubuntu 16.04

The problem can be corrected by updating your system the updated package versions.

References:
https://ubuntu.com/security/notices