Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Ausführen von Code mit höheren Privilegien in Linux
Aktuelle Meldungen Distributionen
Name: Ausführen von Code mit höheren Privilegien in Linux
ID: USN-3292-2
Distribution: Ubuntu
Plattformen: Ubuntu 16.04 LTS
Datum: Mi, 17. Mai 2017, 06:28
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7477

Originalnachricht


--===============1022403318590926756==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="iBwuxWUsK/REspAd"
Content-Disposition: inline


--iBwuxWUsK/REspAd
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-3292-2
May 17, 2017

linux-hwe vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS

Summary:

The system could be made to crash or run programs as an administrator.

Software Description:
- linux-hwe: Linux hardware enablement (HWE) kernel

Details:

USN-3292-1 fixed a vulnerability in the Linux kernel for Ubuntu 16.10.
This update provides the corresponding updates for the Linux Hardware
Enablement (HWE) kernel from Ubuntu 16.10 for Ubuntu 16.04 LTS.

Jason Donenfeld discovered a heap overflow in the MACsec module in the
Linux kernel. An attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
linux-image-4.8.0-52-generic 4.8.0-52.55~16.04.1
linux-image-4.8.0-52-generic-lpae 4.8.0-52.55~16.04.1
linux-image-4.8.0-52-lowlatency 4.8.0-52.55~16.04.1
linux-image-generic-hwe-16.04 4.8.0.52.23
linux-image-generic-lpae-hwe-16.04 4.8.0.52.23
linux-image-lowlatency-hwe-16.04 4.8.0.52.23

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
http://www.ubuntu.com/usn/usn-3292-2
http://www.ubuntu.com/usn/usn-3292-1
CVE-2017-7477

Package Information:
https://launchpad.net/ubuntu/+source/linux-hwe/4.8.0-52.55~16.04.1


--iBwuxWUsK/REspAd
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=zeFM
-----END PGP SIGNATURE-----

--iBwuxWUsK/REspAd--


--===============1022403318590926756==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============1022403318590926756==--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung