drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in Linux (Aktualisierung)
Name: |
Zwei Probleme in Linux (Aktualisierung) |
|
ID: |
USN-3386-2 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 12.04 ESM |
|
Datum: |
Fr, 11. August 2017, 06:55 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000111
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000112 |
|
Applikationen: |
Linux |
|
Update von: |
Zwei Probleme in Linux |
|
Originalnachricht |
--===============8378516096043791753== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="6ymx44zpf63m64vb" Content-Disposition: inline
--6ymx44zpf63m64vb Content-Type: text/plain; charset=us-ascii Content-Disposition: inline
========================================================================== Ubuntu Security Notice USN-3386-2 August 11, 2017
linux-lts-trusty vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 ESM
Summary:
Several security issues were fixed in the Linux kernel.
Software Description: - linux-lts-trusty: Linux hardware enablement kernel from Trusty for Precise ESM
Details:
USN-3386-1 fixed vulnerabilities in the Linux kernel for Ubuntu 14.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 14.04 LTS for Ubuntu 12.04 ESM.
Andrey Konovalov discovered a race condition in the UDP Fragmentation Offload (UFO) code in the Linux kernel. A local attacker could use this to cause a denial of service or execute arbitrary code. (CVE-2017-1000112)
Andrey Konovalov discovered a race condition in AF_PACKET socket option handling code in the Linux kernel. A local unprivileged attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2017-1000111)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04 ESM: linux-image-3.13.0-128-generic 3.13.0-128.177~precise1 linux-image-3.13.0-128-generic-lpae 3.13.0-128.177~precise1 linux-image-generic-lpae-lts-trusty 3.13.0.128.118 linux-image-generic-lts-trusty 3.13.0.128.118
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: https://www.ubuntu.com/usn/usn-3386-2 https://www.ubuntu.com/usn/usn-3386-1 CVE-2017-1000111, CVE-2017-1000112
--6ymx44zpf63m64vb Content-Type: application/pgp-signature; name="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQIcBAABCgAGBQJZjSu8AAoJEC8Jno0AXoH0Qx0P/jyId1xjApCuLkClDBIxA3kC 4uZ8HLrM+ekg9vVRchbabK0EWw9jQmAbuP8ZBP2m5vrbkiormfmKMRSsSwmryid+ CBvV7DUjCjgCtdWzRiSo2JYiCYMe1J+CVwuRDzjZoeMUzvsGFCKnliBvlEeZEpPk O2fJ8ndVqBY5mQr1fk68F64lYaT4OUrzXvr8xRZUVMvV2wY72vjIGPpAtq2fESyx dc6jc7LDlef3opcJ7Psk5OLTyCWufzY5KH0PYtp/80Y7PxeboUOCbanXGEz7hBcR v8e5POJ9u6QBDInuMFsTVfUq/K9n6WS3eUZQztpmSuR8Wl4F7vxJixxIT7liMDPA +/qJIGePODl+V7AFd2bqxnmbhawACarTTnyif1moVBJFVZ9Jt8QLCl3MGidvWyGr RdyG15OAy8G4nedjvKm8AXJe1EsOTIS+b642aC7BbgHo+pm0LyQGd7fvz1ceGo7w 7b+mm14jan93ppX03ll6oaaQLWi/53o1DNUzSdJZsjBrCrOvd9wReYyla+vV9cKQ WBhpBT54kVON0xYZ5qHDnMkZh3OMDu2MQWK6HROS0t+bUVHf/fwYKgiE9xlfIeu3 uwCFe+jN4rDx5tMOAQp+pJU/kYyLVHVSaXOe7lSpVdd+d5MHT/ywmpjPAbI5oyFH fpW3/zefKmgQKUMFUnH/ =I9ZV -----END PGP SIGNATURE-----
--6ymx44zpf63m64vb--
--===============8378516096043791753== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============8378516096043791753==--
|
|
|
|