drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen von Code mit höheren Privilegien in Linux
Name: |
Ausführen von Code mit höheren Privilegien in Linux |
|
ID: |
USN-2978-3 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 15.10 |
|
Datum: |
Di, 17. Mai 2016, 07:06 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0758 |
|
Applikationen: |
Linux |
|
Originalnachricht |
--===============0934544412193218030== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="/+TVfO13bGamJ+u9" Content-Disposition: inline
--/+TVfO13bGamJ+u9 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline
========================================================================== Ubuntu Security Notice USN-2978-3 May 16, 2016
linux-raspi2 vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.10
Summary:
The system could be made to crash or run programs as an administrator.
Software Description: - linux-raspi2: Linux kernel for Raspberry Pi 2
Details:
Philip Pettersson discovered that the Linux kernel's ASN.1 DER decoder did not properly process certificate files with tags of indefinite length. A local unprivileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code with administrative privileges.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 15.10: linux-image-4.2.0-1029-raspi2 4.2.0-1029.38
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: http://www.ubuntu.com/usn/usn-2978-3 http://www.ubuntu.com/usn/usn-2978-1 CVE-2016-0758
Package Information: https://launchpad.net/ubuntu/+source/linux-raspi2/4.2.0-1029.38
--/+TVfO13bGamJ+u9 Content-Type: application/pgp-signature; name="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBCgAGBQJXOhsrAAoJEC8Jno0AXoH0uWsP/iwJvrbiyuMeMoUIY4bejaJT +tDgjqMECgRv4e8HTv4dyyGlZbCD/JlR6STpVN29AzuKevxIoQ97qdaVdNDwXv6f 5nKKdW3DUOqdA58MlCbqr6DjL3NdsdV72c/UHQzGckhfTkeNFPoV5fV1tqM5upau q6tEgPEGTDkpQtKhx8Z6a3MFN+7Pt83POu5q3bAHEp7yZZh1n0w51uAS0pmyf5mN Wc85sJd9DwmgfnqZu7gmbmdwbR5g6hTRP73Y7InPpZEd5vqXsmD260rp+xucQ+py vdVmWiTgH8ELwOVvGtvKq2ZVgP4gAxgUxBlzi+/cSkNE/UMPi6fvJA/wFlxxrSD4 uUe7zedm+mVL1KfPrysjUXtgciGqq0nOkraHY1aPGavP5hJHxzVkYTwN6V79jV9d GP4EIUXc23FoaS2eN28tVcTvp7mBr4KsS649Jw532WhajTDidu9PzDhQ+RySFZs4 wxZOSscDZFEcRTDfuC/HQvKn53uvHsvR0DwLssGdZjohmGt/CodEEIhJ7j2sUtDb 6qKJ+2dkH0rMiHQpg8btkqfAUvD4rW/YFSb9TldPadM8UgOKlsJP2HruJQJnqhdS a8VzaB547OuTE6pNEFgc6JorLFet3PcrixW6jAO4GWQspeA3DHfTAk6PtjT1poWW omymjXqTng1XGuzOSZB7 =i9KR -----END PGP SIGNATURE-----
--/+TVfO13bGamJ+u9--
--===============0934544412193218030== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============0934544412193218030==--
|
|
|
|