drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Linux (Aktualisierung)
Name: |
Mehrere Probleme in Linux (Aktualisierung) |
|
ID: |
USN-3291-2 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 16.04 LTS |
|
Datum: |
Mi, 17. Mai 2017, 23:05 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7261
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7187
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7616
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7294 |
|
Applikationen: |
Linux |
|
Update von: |
Mehrere Probleme in Linux |
|
Originalnachricht |
--===============6309132341492568029== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="kHRd/tpU31Zn62xO" Content-Disposition: inline
--kHRd/tpU31Zn62xO Content-Type: text/plain; charset=us-ascii Content-Disposition: inline
========================================================================== Ubuntu Security Notice USN-3291-2 May 17, 2017
linux-aws, linux-gke, linux-raspi2, linux-snapdragon vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description: - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-gke: Linux kernel for Google Container Engine (GKE) systems - linux-raspi2: Linux kernel for Raspberry Pi 2 - linux-snapdragon: Linux kernel for Snapdragon Processors
Details:
USN-3291-1 fixed vulnerabilities in the generic Linux kernel. This update provides the corresponding updates for the Linux kernel built for specific processors and cloud environments.
Dmitry Vyukov discovered that the generic SCSI (sg) subsystem in the Linux kernel contained a stack-based buffer overflow. A local attacker with access to an sg device could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-7187)
It was discovered that a NULL pointer dereference existed in the Direct Rendering Manager (DRM) driver for VMWare devices in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-7261)
Li Qiang discovered that an integer overflow vulnerability existed in the Direct Rendering Manager (DRM) driver for VMWare devices in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-7294)
It was discovered that an information leak existed in the set_mempolicy and mbind compat syscalls in the Linux kernel. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2017-7616)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04 LTS: linux-image-4.4.0-1013-gke 4.4.0-1013.13 linux-image-4.4.0-1017-aws 4.4.0-1017.26 linux-image-4.4.0-1055-raspi2 4.4.0-1055.62 linux-image-4.4.0-1058-snapdragon 4.4.0-1058.62 linux-image-aws 4.4.0.1017.20 linux-image-gke 4.4.0.1013.15 linux-image-raspi2 4.4.0.1055.56 linux-image-snapdragon 4.4.0.1058.51
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: http://www.ubuntu.com/usn/usn-3291-2 http://www.ubuntu.com/usn/usn-3291-1 CVE-2017-7187, CVE-2017-7261, CVE-2017-7294, CVE-2017-7616
Package Information: https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1017.26 https://launchpad.net/ubuntu/+source/linux-gke/4.4.0-1013.13 https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1055.62 https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1058.62
--kHRd/tpU31Zn62xO Content-Type: application/pgp-signature; name="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBCgAGBQJZHJZgAAoJEC8Jno0AXoH0Jy8P/RjliKD9tVwCLnqyJPFhPOM9 ZzqzsVDD0sBFJUbcMKbWoYgGZy76iqmE/Po5nNxz+AWciVSqaE1xeQTn4R2lVlTr vVu1X0jBARkulX2H3S/JyaSD5K5Di2YaiyvExY/zUvwyYuxCWpfvsrk7zwJK15Ir 3CO5wK+Xn+ITRYmJRUYcUVXd5BAMo6ipsN9iC9SG/uYsRakETTp0T3fzQC1uf2tb Vfn6LGRHcfTlSmPpi2jXzijuvlio/SKYJXrCyNuBEEYeBYfrFkV9uFcjxhA6L411 onMJmiRogydFxFf6xbnQ+6zCBXy6/CXwVYVYXJkIecBOug4YQcuFo9F1OreGYjnG lrJTwf0AjB17yHgzXxIIIYPyvt3iCcE/Mwcwn1nTp5jBGURbTIz7eeVxChQ0OT8m eyPV2Cs668E0uQMKSFaYFw7zasB5RIgntlSdh8M+NgtRoCK43CvbWYFNDdCXe/nA gA6aMmu18aukFF9Uq/olnrW6ITqsXlL3DPyDB60No7K1MCJJ6IgSqblBXCm0e2qU rth/fPk8HS9HHvXckPtAiskBnZV4AV12MbulVQckoAcJvbS4jY3wwzelbAMI0ite I4mFV0iPikodypp44N6vWFNzVioLjEG3cL77/20Qgerk/yQdXUURWiCnoyaYBT1W mgm7sg1pqO2j3XkNkXyH =8fuG -----END PGP SIGNATURE-----
--kHRd/tpU31Zn62xO--
--===============6309132341492568029== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============6309132341492568029==--
|
|
|
|