Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: USN-3392-1
Distribution: Ubuntu
Plattformen: Ubuntu 16.04 LTS
Datum: Mi, 16. August 2017, 10:34
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7482
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7533
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10810
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365

Originalnachricht


--===============0815047453184875090==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="4vpmphjn6do5azr5"
Content-Disposition: inline


--4vpmphjn6do5azr5
Content-Type: text/plain; charset=utf-8
Content-Disposition: inlin
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-3392-1
August 16, 2017

linux, linux-aws, linux-gke, linux-raspi2, linux-snapdragon regression
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS

Summary:

USN-3378-1 introduced a regression in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
- linux-raspi2: Linux kernel for Raspberry Pi 2
- linux-snapdragon: Linux kernel for Snapdragon processors

Details:

USN-3378-1 fixed vulnerabilities in the Linux kernel. Unfortunately, a
regression was introduced that prevented conntrack from working
correctly in some situations. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

Fan Wu and Shixiong Zhao discovered a race condition between inotify events
and vfs rename operations in the Linux kernel. An unprivileged local
attacker could use this to cause a denial of service (system crash) or
execute arbitrary code. (CVE-2017-7533)

It was discovered that the Linux kernel did not properly restrict
RLIMIT_STACK size. A local attacker could use this in conjunction with
another vulnerability to possibly execute arbitrary code.
(CVE-2017-1000365)

李区 discovered that the Virtio GPU driver in the Linux kernel did not
properly free memory in some situations. A local attacker could use this to
cause a denial of service (memory consumption). (CVE-2017-10810)

石磊 discovered that the RxRPC Kerberos 5 ticket handling code in the
Linux kernel did not properly verify metadata. A remote attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2017-7482)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
linux-image-4.4.0-1027-gke 4.4.0-1027.27
linux-image-4.4.0-1031-aws 4.4.0-1031.40
linux-image-4.4.0-1070-raspi2 4.4.0-1070.78
linux-image-4.4.0-1072-snapdragon 4.4.0-1072.77
linux-image-4.4.0-92-generic 4.4.0-92.115
linux-image-4.4.0-92-generic-lpae 4.4.0-92.115
linux-image-4.4.0-92-lowlatency 4.4.0-92.115
linux-image-4.4.0-92-powerpc-e500mc 4.4.0-92.115
linux-image-4.4.0-92-powerpc-smp 4.4.0-92.115
linux-image-4.4.0-92-powerpc64-emb 4.4.0-92.115
linux-image-4.4.0-92-powerpc64-smp 4.4.0-92.115
linux-image-aws 4.4.0.1031.33
linux-image-generic 4.4.0.92.97
linux-image-generic-lpae 4.4.0.92.97
linux-image-gke 4.4.0.1027.28
linux-image-lowlatency 4.4.0.92.97
linux-image-powerpc-e500mc 4.4.0.92.97
linux-image-powerpc-smp 4.4.0.92.97
linux-image-powerpc64-emb 4.4.0.92.97
linux-image-powerpc64-smp 4.4.0.92.97
linux-image-raspi2 4.4.0.1070.70
linux-image-snapdragon 4.4.0.1072.64

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://www.ubuntu.com/usn/usn-3392-1
https://bugs.launchpad.net/bugs/1709032, https://usn.ubuntu.com/usn/usn-3378-1

Package Information:
https://launchpad.net/ubuntu/+source/linux/4.4.0-92.115
https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1031.40
https://launchpad.net/ubuntu/+source/linux-gke/4.4.0-1027.27
https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1070.78
https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1072.77


--4vpmphjn6do5azr5
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=8wp1
-----END PGP SIGNATURE-----

--4vpmphjn6do5azr5--


--===============0815047453184875090==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============0815047453184875090==--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung