Mehrere Probleme in Linux
ID: | USN-2565-1 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 14.10 |
Datum: | Do, 9. April 2015, 15:31 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1593
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2041 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2042 |
Applikationen: | Linux |
Originalnachricht |
|
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============6032428814663432954== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="cUbVIbTNT3kgtn9cCPOHxEl7iTPIpgOMj" This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --cUbVIbTNT3kgtn9cCPOHxEl7iTPIpgOMj Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable ========================================================================== Ubuntu Security Notice USN-2565-1 April 09, 2015 linux vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.10 Summary: Several security issues were fixed in the kernel. Software Description: - linux: Linux kernel Details: An integer overflow was discovered in the stack randomization feature of the Linux kernel on 64 bit platforms. A local attacker could exploit this flaw to bypass the Address Space Layout Randomization (ASLR) protection mechanism. (CVE-2015-1593) An information leak was discovered in the Linux Kernel's handling of userspace configuration of the link layer control (LLC). A local user could exploit this flaw to read data from other sysctl settings. (CVE-2015-2041) An information leak was discovered in how the Linux kernel handles setting the Reliable Datagram Sockets (RDS) settings. A local user could exploit this flaw to read data from other sysctl settings. (CVE-2015-2042) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.10: linux-image-3.16.0-34-generic 3.16.0-34.45 linux-image-3.16.0-34-generic-lpae 3.16.0-34.45 linux-image-3.16.0-34-lowlatency 3.16.0-34.45 linux-image-3.16.0-34-powerpc-e500mc 3.16.0-34.45 linux-image-3.16.0-34-powerpc-smp 3.16.0-34.45 linux-image-3.16.0-34-powerpc64-emb 3.16.0-34.45 linux-image-3.16.0-34-powerpc64-smp 3.16.0-34.45 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. If you use linux-restricted-modules, you have to update that package as well to get modules which work with the new kernel version. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-server, linux-powerpc), a standard system upgrade will automatically perform this as well. References: http://www.ubuntu.com/usn/usn-2565-1 CVE-2015-1593, CVE-2015-2041, CVE-2015-2042 Package Information: https://launchpad.net/ubuntu/+source/linux/3.16.0-34.45 --cUbVIbTNT3kgtn9cCPOHxEl7iTPIpgOMj Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJVJldZAAoJEAUvNnAY1cPYFWgP/1SEGe0fGE9QRgkHQUiWJZGQ s37Ipc9eloIPKt1QQk2303h/4p3gDkhXGSnMvMc/UgSViBpmjuHE1FWKtH2XUBdb Ed8P9CoWdYN7cU0jXmbB5lm8kMomfGrJu/KKz4jWGyJC8eqMIrpk97IrI2LgjQAI kfYYBaP3i1Vz65E458xnsG7X0XJdyD3BBVkSfZwopGz/Ffi3NmOf9wfQ31OvdFs+ V68583N7P1KBsyaL0z9dGahVRRqsy6OY3arFOUQCmkQGk+B22LKIKeHIVh4W32mg kHzsQcgCt6FV4f7A80cKY0Dgf0yS8uL1pUw/tEuSrKxKAKhAyHVRek7K8hW3E6Bt BpGYt0BYu8TaIPz16Xv+xJPaufr7tM2QpNfP10RY9sHxr9s03b8+eYheSkW/OAyX XTtI4TXD3cCBuCg62iUmd5lHKZx3a8Xw93HcRSN8TR1XLUqPEBrKIivQromBkO5G RsMv/ijkl/ZxO1BXCauzn0TeBVRgl7nmz/WKRGzFihKMGUkP6KPgzq3unFc2nR26 EIIbjjocRHfJ3L88p0QekIPc/Mm7C2yAVTw1eeJj2TFkYudZPLmeXVNHBU8jz7E1 MkToZqLzrW25lEinCPE+YzCvU9cToK2fr+oV1Ca5DUs6SF1tM0gLoCk4vPg9aLgo AV97A5QX9JMZDRAwSYFv =88od -----END PGP SIGNATURE----- --cUbVIbTNT3kgtn9cCPOHxEl7iTPIpgOMj-- --===============6032428814663432954== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce --===============6032428814663432954==-- |