drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in Linux (Aktualisierung)
Name: |
Pufferüberlauf in Linux (Aktualisierung) |
|
ID: |
USN-3129-2 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 16.10 |
|
Datum: |
Fr, 11. November 2016, 13:13 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7042 |
|
Applikationen: |
Linux |
|
Update von: |
Pufferüberlauf in Linux |
|
Originalnachricht |
--===============6660235762633444270== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="C01fF7hLGvN0zd9s" Content-Disposition: inline
--C01fF7hLGvN0zd9s Content-Type: text/plain; charset=us-ascii Content-Disposition: inline
========================================================================== Ubuntu Security Notice USN-3129-2 November 11, 2016
linux-raspi2 vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.10
Summary:
The system could be made to crash under certain conditions.
Software Description: - linux-raspi2: Linux kernel for Raspberry Pi 2
Details:
Ondrej Kozina discovered that the keyring interface in the Linux kernel contained a buffer overflow when displaying timeout events via the /proc/keys interface. A local attacker could use this to cause a denial of service (system crash). (CVE-2016-7042)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.10: linux-image-4.8.0-1018-raspi2 4.8.0-1018.21 linux-image-raspi2 4.8.0.1018.21
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: http://www.ubuntu.com/usn/usn-3129-2 http://www.ubuntu.com/usn/usn-3129-1 CVE-2016-7042
Package Information: https://launchpad.net/ubuntu/+source/linux-raspi2/4.8.0-1018.21
--C01fF7hLGvN0zd9s Content-Type: application/pgp-signature; name="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBCgAGBQJYJZJ8AAoJEC8Jno0AXoH0zs4P/jbKNHmOrMBpzIxqlHy0Xkxs 9bXgzcgeTnXAqX93NBRbuI499zRx/1luOfYGEZGYeNRQNjrf4OqkHoG1xIAaK0a0 Ers3LP5SQ2wYMY+1yy5loqrXEUACTeBuTa06MhaPN2hQpg78BNcLSVr4TqUv/nQr P0VTjTS0sF2cOWdy/+0Ete0cJH/wBAdZTNPkTxKJlZpa4VupyyTdQGoXHMPJdMSo ofqSaaEnwOphF41ziLhV95U+Y++K/QGZrA8nft4LUgPLPGIGDSfbfEXqCCjLVUnk 5Tz56Hf9tIxH84n8oCNkrILorGOqqteR52Y/4AYGwU6SbTiHKoyhSKrmhfAQ8EnR dNIvH9yWBfuS8d/Xtd+7nwYvUNr8Yq4WUJDTQl8hk8mjdQNo5ReJQeNbIgD4213R N9wqf7DkkdP9F0MFGGy8z7Ml+OefR0ur08El9IVCoTsvt+p6ugNUismyIxSphzTb 4NqEz8NPl3fqR2r7Uh6d0x0gYmwIYlyD7wBBFi/v9QSJF4/wn2UJWPaynLdxsDra y7CG9HRJRx9pqoD1LuhorBw+mzl7+QZjwkh4fYWMmdS+GE9FDc5hym/Y6gE45wYf R3ucwFpdw5DWPIUy2b/cUOG6CTEZj/0DmkPaL2RkTIzyTfh3nwGsjVDZgpJTRylm UvCvOjhf5Lj4OzXuWw19 =JbHu -----END PGP SIGNATURE-----
--C01fF7hLGvN0zd9s--
--===============6660235762633444270== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============6660235762633444270==--
|
|
|
|