Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux (Aktualisierung)
ID: USN-3190-2
Distribution: Ubuntu
Plattformen: Ubuntu 16.10
Datum: Fr, 10. Februar 2017, 07:20
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9777
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10147
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8399
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8632
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10150
Applikationen: Linux
Update von: Mehrere Probleme in Linux

Originalnachricht


--===============5713850688206404535==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="LKTjZJSUETSlgu2t"
Content-Disposition: inline


--LKTjZJSUETSlgu2t
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-3190-2
February 10, 2017

linux-raspi2 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.10

Summary:

Several security issues were fixed in the kernel.

Software Description:
- linux-raspi2: Linux kernel for Raspberry Pi 2

Details:

Mikulas Patocka discovered that the asynchronous multibuffer cryptographic
daemon (mcryptd) in the Linux kernel did not properly handle being invoked
with incompatible algorithms. A local attacker could use this to cause a
denial of service (system crash). (CVE-2016-10147)

It was discovered that a use-after-free existed in the KVM susbsystem of
the Linux kernel when creating devices. A local attacker could use this to
cause a denial of service (system crash). (CVE-2016-10150)

Qidan He discovered that the ICMP implementation in the Linux kernel did
not properly check the size of an ICMP header. A local attacker with
CAP_NET_ADMIN could use this to expose sensitive information.
(CVE-2016-8399)

Qian Zhang discovered a heap-based buffer overflow in the tipc_msg_build()
function in the Linux kernel. A local attacker could use to cause a denial
of service (system crash) or possible execute arbitrary code with
administrative privileges. (CVE-2016-8632)

Dmitry Vyukov discovered that the KVM implementation in the Linux kernel
did not properly restrict the VCPU index when I/O APIC is enabled, An
attacker in a guest VM could use this to cause a denial of service (system
crash) or possibly gain privileges in the host OS. (CVE-2016-9777)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.10:
linux-image-4.8.0-1024-raspi2 4.8.0-1024.27
linux-image-raspi2 4.8.0.1024.27

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
http://www.ubuntu.com/usn/usn-3190-2
http://www.ubuntu.com/usn/usn-3190-1
CVE-2016-10147, CVE-2016-10150, CVE-2016-8399, CVE-2016-8632,
CVE-2016-9777

Package Information:
https://launchpad.net/ubuntu/+source/linux-raspi2/4.8.0-1024.27


--LKTjZJSUETSlgu2t
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=ULXh
-----END PGP SIGNATURE-----

--LKTjZJSUETSlgu2t--


--===============5713850688206404535==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============5713850688206404535==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung