drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen von Code mit höheren Privilegien in Linux
Name: |
Ausführen von Code mit höheren Privilegien in Linux |
|
ID: |
USN-3292-2 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 16.04 LTS |
|
Datum: |
Mi, 17. Mai 2017, 06:28 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7477 |
|
Applikationen: |
Linux |
|
Originalnachricht |
--===============1022403318590926756== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="iBwuxWUsK/REspAd" Content-Disposition: inline
--iBwuxWUsK/REspAd Content-Type: text/plain; charset=us-ascii Content-Disposition: inline
========================================================================== Ubuntu Security Notice USN-3292-2 May 17, 2017
linux-hwe vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
Summary:
The system could be made to crash or run programs as an administrator.
Software Description: - linux-hwe: Linux hardware enablement (HWE) kernel
Details:
USN-3292-1 fixed a vulnerability in the Linux kernel for Ubuntu 16.10. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 16.10 for Ubuntu 16.04 LTS.
Jason Donenfeld discovered a heap overflow in the MACsec module in the Linux kernel. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04 LTS: linux-image-4.8.0-52-generic 4.8.0-52.55~16.04.1 linux-image-4.8.0-52-generic-lpae 4.8.0-52.55~16.04.1 linux-image-4.8.0-52-lowlatency 4.8.0-52.55~16.04.1 linux-image-generic-hwe-16.04 4.8.0.52.23 linux-image-generic-lpae-hwe-16.04 4.8.0.52.23 linux-image-lowlatency-hwe-16.04 4.8.0.52.23
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: http://www.ubuntu.com/usn/usn-3292-2 http://www.ubuntu.com/usn/usn-3292-1 CVE-2017-7477
Package Information: https://launchpad.net/ubuntu/+source/linux-hwe/4.8.0-52.55~16.04.1
--iBwuxWUsK/REspAd Content-Type: application/pgp-signature; name="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBCgAGBQJZG7AgAAoJEC8Jno0AXoH0lDUP/2HKaqbEF955r+jB+9cLiUts B4T7higC+IG/gp/PIrMtI0t0ItBLiebnJ+6LVRWurvWcKhqjRPoV33HLbol5Gfir ZzsuZjAUQn1bFU6fzVxTFn/41rmXklCTwZxwntykhJBYdvib2S6LUKROtYz22qjD rWKCPxAYF+HEevPktmhyrbEpAKCbhcvv/B1IXuhISbzvtzUJEncPVwZzwhtDM+gG hU4JNiEH7s78o2F/UjLukQtr5vmNLMF5wHtjc5gu5sstGU49P2+ULhvjLLjcaXuZ oa5Wv2Eg0OhgJqKBXj0UN8AssggzK/lmKDnJNxr3nAbZAcwaTVnQfH5kFhigrBJA uErOLK2vtNKMhqsG9wJwWFW5UlsMuCHwiN7mAyvTaYoMmr8w4Us6lGAXB3aXcRxu abne6+aYhCXI6duyhZ6isllYHfZyZSLaiJmkRAOx68o4LZ1ct50Koa3kLAehSjzB eDchrjKaanMEVEDzRSO8qFmpuhU0FymPV2Ts11l9Owjlx2mOmFwu14K8fC1Ia2Gu Fp6cKs3PzgXuRS7PKM9YCiOzD/1xGxtjk2kcqnvD7eLBf4CIG5EaEirR/8m39xQn 9Bugq9hjGvNIyVJMaN2q1LAhfOoepih4JOOhGEvk2koZY4EPizQ6xLlHtP286FfY VVWOpdrzi2IYPIKw4dHV =zeFM -----END PGP SIGNATURE-----
--iBwuxWUsK/REspAd--
--===============1022403318590926756== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============1022403318590926756==--
|
|
|
|