drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Linux (Aktualisierung)
Name: |
Mehrere Probleme in Linux (Aktualisierung) |
|
ID: |
USN-3084-3 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 16.04 LTS |
|
Datum: |
Mo, 19. September 2016, 23:07 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6136
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5412
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6156 |
|
Applikationen: |
Linux |
|
Update von: |
Mehrere Probleme in Linux |
|
Originalnachricht |
--===============3057452224880017456== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="Cp3Cp8fzgozWLBWL" Content-Disposition: inline
--Cp3Cp8fzgozWLBWL Content-Type: text/plain; charset=us-ascii Content-Disposition: inline
========================================================================== Ubuntu Security Notice USN-3084-3 September 19, 2016
linux-raspi2 vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description: - linux-raspi2: Linux kernel for Raspberry Pi 2
Details:
Pengfei Wang discovered a race condition in the audit subsystem in the Linux kernel. A local attacker could use this to corrupt audit logs or disrupt system-call auditing. (CVE-2016-6136)
It was discovered that the powerpc and powerpc64 hypervisor-mode KVM implementation in the Linux kernel for did not properly maintain state about transactional memory. An unprivileged attacker in a guest could cause a denial of service (CPU lockup) in the host OS. (CVE-2016-5412)
Pengfei Wang discovered a race condition in the Chrome OS embedded controller device driver in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2016-6156)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04 LTS: linux-image-4.4.0-1023-raspi2 4.4.0-1023.29
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: http://www.ubuntu.com/usn/usn-3084-3 http://www.ubuntu.com/usn/usn-3084-1 CVE-2016-5412, CVE-2016-6136, CVE-2016-6156
Package Information: https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1023.29
--Cp3Cp8fzgozWLBWL Content-Type: application/pgp-signature; name="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBCgAGBQJX4Dq1AAoJEC8Jno0AXoH0m1MP/AtGXAOaDiIHNEMC/Ch5lYFn wXa7VyFZ95FgRau9Cr7qytYff0qZcqRri3QgpGQfa//zqJMqnHB+BR6CKcRDrbJr LIB0xUgjdQjozX0nQmfeipPgxGYmF/+fXfxXEfbRi61sYLBJv24of4nalwza5rQo V3J/b1YeVAO5ZlRC5vuncmRtgA/LhqJCCklxmU5hBI5AqK5mBL9fG+nDFzMOiVEj llWwUCzDcNTxci3KEDpXFTuKkQnmxszPPWhuIX30UCO/Nlp95/RcuN1g/O1xwffp W0pTOtR7xglXCqsTt2Lrk9WuaSYxBmFOWgdc6i4pCJYnLx0POxiqLdZGpb3K2Ddw aN/qvEcA+s5nHjQf9Tj0u2HzE/HHPUqzrm/WiZkyYuUQKL6BUpddLkanBFeA2M7C bZ5lzPOSlWHnpxzZi48wp2Pfiaj6Y1lK5QY2Tr53DkO1UaFF/HREKfXz8uHphReS 8pjLw1yYadoGGy1lw7Mf7Io6WxigtJ++Nimmrf9nm8NqkQctjDs/akVJuJnwgcwt aYQ/wxdKuxM28ZhHEe5InRXHWQxNwggQlD8vNAjO6rXVwlYOxjZunJp+UH0AJG3Z RkHrE8hv0Bql8bvA2Tlo7ks0ZzhIhoixrAN8yBqknisjzc9KDiF322sX3OABpVhF Xjw5Ii2kW8FrNvewQmUK =bN4g -----END PGP SIGNATURE-----
--Cp3Cp8fzgozWLBWL--
--===============3057452224880017456== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============3057452224880017456==--
|
|
|
|