Login
Newsletter
Werbung

Sicherheit: Denial of Service in Linux
Aktuelle Meldungen Distributionen
Name: Denial of Service in Linux
ID: USN-3034-1
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS
Datum: Fr, 15. Juli 2016, 07:06
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3070
Applikationen: Linux

Originalnachricht


--===============2238810605056949598==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="f0KYrhQ4vYSV2aJu"
Content-Disposition: inline


--f0KYrhQ4vYSV2aJu
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-3034-1
July 14, 2016

linux vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 LTS

Summary:

The system could be made to crash under certain conditions.

Software Description:
- linux: Linux kernel

Details:

Jan Stancek discovered that the Linux kernel's memory manager did not
properly handle moving pages mapped by the asynchronous I/O (AIO) ring
buffer to the other nodes. A local attacker could use this to cause a
denial of service (system crash).

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
linux-image-3.13.0-92-generic 3.13.0-92.139
linux-image-3.13.0-92-generic-lpae 3.13.0-92.139
linux-image-3.13.0-92-lowlatency 3.13.0-92.139
linux-image-3.13.0-92-powerpc-e500 3.13.0-92.139
linux-image-3.13.0-92-powerpc-e500mc 3.13.0-92.139
linux-image-3.13.0-92-powerpc-smp 3.13.0-92.139
linux-image-3.13.0-92-powerpc64-emb 3.13.0-92.139
linux-image-3.13.0-92-powerpc64-smp 3.13.0-92.139

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
http://www.ubuntu.com/usn/usn-3034-1
CVE-2016-3070

Package Information:
https://launchpad.net/ubuntu/+source/linux/3.13.0-92.139


--f0KYrhQ4vYSV2aJu
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCgAGBQJXiBblAAoJEC8Jno0AXoH0H68P/A7OaNozEiEF2QtAwtBpQvV0
sS9B9ATT6BOysVIlvgL1aLJmoJ6GCxbwGZgqTyqcHpQH1d0qaYxobG8XHdjOYBvU
CH/vES2j7LCtx96kopK4VJOJBVE6dJGY4svrUmWW/sAxVhpxN3My3IgCyMX/hreY
VUO6Br7/XTuYk5ROAr6Uu2n0TsDc2Vfjc8kKUYw7XCN5+fkmJ6LXqd9BLI0X9/pl
VZ9V7lmO93OlMC7NoC/PO07ZlNwIhf1u5wIAcXkiyyg/P23FQNAPykFo71gSzCid
C1JW3woz2cMcARI8L0bZDgAfID6pXbwKmV0pKrk4gnhboE7B/ocBm2SGI8/9vcNT
4pW6m6naMmTu6H0MLIyKmneNINphwt1NitGxC9/f9o5aSjEKgJaUwbgZGC0pbpZW
e2fzfOkPHdiOz2RzMq4jk+zbFDMNCVA5mhf9lQ482TgZVB39kgzMS8EFPXfDD7e8
VrFaGZMxEYwSofa877r4qTjXm7XCPLC2KUoVSgsELsPuExUlicRd8xHZlSpRPXrP
CgyRe9Fid0ueEYcV2P0qCaCJkyete7L8ovQyC1zywWegN5xktFJPez/T3liJ1luL
+lNAaa0DxvwrMDSBS168IVtrhgTqtPuhhlyBRpNxzgflLRliX9SAXlRaJj4/e2RU
yaKNNR1vaH2oZdTwyCV7
=QjNO
-----END PGP SIGNATURE-----

--f0KYrhQ4vYSV2aJu--


--===============2238810605056949598==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============2238810605056949598==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung