Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Ausführen von Code mit höheren Privilegien in GNU C library
Aktuelle Meldungen Distributionen
Name: Ausführen von Code mit höheren Privilegien in GNU C library
ID: USN-3323-1
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 16.10, Ubuntu 17.04
Datum: Mo, 19. Juni 2017, 22:19
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============2166067565493626129==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="cxbjOw2EF0nf5ncAQmr9rgoDDuAATfrnI"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--cxbjOw2EF0nf5ncAQmr9rgoDDuAATfrnI
Content-Type: multipart/mixed;
boundary="l5nEtNxsvNSQEu060BprC4NwlVI1SVMvM";
protected-headers="v1"
From: Marc Deslauriers <marc.deslauriers@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: "ubuntu-security-announce@lists.ubuntu.com"
<ubuntu-security-announce@lists.ubuntu.com>
Message-ID: <c248fc70-b222-176b-7adf-36e6b3b471d1@canonical.com>
Subject: [USN-3323-1] GNU C Library vulnerability

--l5nEtNxsvNSQEu060BprC4NwlVI1SVMvM
Content-Type: text/plain; charset=utf-8
Content-Language: en-C
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-3323-1
June 19, 2017

eglibc, glibc vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.04
- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Gnu C library could be made to run programs as an administrator.

Software Description:
- glibc: GNU C Library
- eglibc: GNU C Library

Details:

It was discovered that the GNU C library did not properly handle memory
when processing environment variables for setuid programs. A local attacker
could use this in combination with another vulnerability to gain
administrative privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.04:
libc6 2.24-9ubuntu2.2

Ubuntu 16.10:
libc6 2.24-3ubuntu2.2

Ubuntu 16.04 LTS:
libc6 2.23-0ubuntu9

Ubuntu 14.04 LTS:
libc6 2.19-0ubuntu6.13

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3323-1
CVE-2017-1000366

Package Information:
https://launchpad.net/ubuntu/+source/glibc/2.24-9ubuntu2.2
https://launchpad.net/ubuntu/+source/glibc/2.24-3ubuntu2.2
https://launchpad.net/ubuntu/+source/glibc/2.23-0ubuntu9
https://launchpad.net/ubuntu/+source/eglibc/2.19-0ubuntu6.13



--l5nEtNxsvNSQEu060BprC4NwlVI1SVMvM--

--cxbjOw2EF0nf5ncAQmr9rgoDDuAATfrnI
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=J2jD
-----END PGP SIGNATURE-----

--cxbjOw2EF0nf5ncAQmr9rgoDDuAATfrnI--


--===============2166067565493626129==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============2166067565493626129==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung