Login
Newsletter
Werbung

Sicherheit: Ausführen von Code mit höheren Privilegien in Linux (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Ausführen von Code mit höheren Privilegien in Linux (Aktualisierung)
ID: USN-3313-2
Distribution: Ubuntu
Plattformen: Ubuntu 16.04 LTS
Datum: Mi, 7. Juni 2017, 10:39
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0605
Applikationen: Linux
Update von: Ausführen von Code mit höheren Privilegien in Linux

Originalnachricht


--===============6235685495308907783==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="SavPGzlo48F1Gxyz"
Content-Disposition: inline


--SavPGzlo48F1Gxyz
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-3313-2
June 07, 2017

linux-hwe vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS

Summary:

The system could be made to run programs as an administrator.

Software Description:
- linux-hwe: Linux hardware enablement (HWE) kernel

Details:

USN-3313-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.10.
This update provides the corresponding updates for the Linux Hardware
Enablement (HWE) kernel from Ubuntu 16.10 for Ubuntu 16.04 LTS.

It was discovered that a buffer overflow existed in the trace subsystem in
the Linux kernel. A privileged local attacker could use this to execute
arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
linux-image-4.8.0-54-generic 4.8.0-54.57~16.04.1
linux-image-4.8.0-54-generic-lpae 4.8.0-54.57~16.04.1
linux-image-4.8.0-54-lowlatency 4.8.0-54.57~16.04.1
linux-image-generic-hwe-16.04 4.8.0.54.25
linux-image-generic-lpae-hwe-16.04 4.8.0.54.25
linux-image-lowlatency-hwe-16.04 4.8.0.54.25

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://www.ubuntu.com/usn/usn-3313-2
https://www.ubuntu.com/usn/usn-3313-1
CVE-2017-0605

Package Information:
https://launchpad.net/ubuntu/+source/linux-hwe/4.8.0-54.57~16.04.1


--SavPGzlo48F1Gxyz
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=NpW+
-----END PGP SIGNATURE-----

--SavPGzlo48F1Gxyz--


--===============6235685495308907783==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============6235685495308907783==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung