drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen von Code mit höheren Privilegien in Linux
Name: |
Ausführen von Code mit höheren Privilegien in Linux |
|
ID: |
USN-3219-2 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 12.04 LTS |
|
Datum: |
Mi, 8. März 2017, 06:27 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2636 |
|
Applikationen: |
Linux |
|
Originalnachricht |
--===============3276580009360456923== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="vv4Sf/kQfcwinyKX" Content-Disposition: inline
--vv4Sf/kQfcwinyKX Content-Type: text/plain; charset=us-ascii Content-Disposition: inline
========================================================================== Ubuntu Security Notice USN-3219-2 March 08, 2017
linux-lts-trusty vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
Summary:
The system could be made to crash or run programs as an administrator.
Software Description: - linux-lts-trusty: Linux hardware enablement kernel from Trusty for Precise
Details:
USN-3219-1 fixed vulnerabilities in the Linux kernel for Ubuntu 14.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 14.04 LTS for Ubuntu 12.04 LTS.
Alexander Popov discovered that the N_HDLC line discipline implementation in the Linux kernel contained a double-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly gain administrative privileges.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04 LTS: linux-image-3.13.0-112-generic 3.13.0-112.159~precise1 linux-image-3.13.0-112-generic-lpae 3.13.0-112.159~precise1 linux-image-generic-lpae-lts-trusty 3.13.0.112.103 linux-image-generic-lts-trusty 3.13.0.112.103
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: http://www.ubuntu.com/usn/usn-3219-2 http://www.ubuntu.com/usn/usn-3219-1 CVE-2017-2636
Package Information: https://launchpad.net/ubuntu/+source/linux-lts-trusty/3.13.0-112.159~precise1
--vv4Sf/kQfcwinyKX Content-Type: application/pgp-signature; name="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBCgAGBQJYv36JAAoJEC8Jno0AXoH0YHIP/jGTHHPfZqe69zL5UcG4/E1S Sc9AXu6XnO1b/RDbaVMporczdgtU6oTuhR40W9Z1TAzcbr7DrqlPcu5emKQs8EI2 eHfcGUI/fNf+rwiIYzI7r9cHysRo+cM2yVZnqe/IttMXY552h91lyafFYUrA0oyE 80lFq5xV8UVJh8w3GdyzKhcHwwnLE20/+K3fmoJPeOFJEGZH2QGbh/BF2YT67xFH MTLNv2X6+jKdDj+qWZgLAnwFH07uJaVmaeQx6nM8jHDtJCJjuNkK7+NGb06KpELu aktEe7jt6JAHKNZ7wMQTvSPEmAFjvms6Rg2Jj3Ca/xgzAB0923IvrR61KJocZu7z 23/CjY99HKYS6nsdAytgD14t9o2/6V8hL+uLFAH5fhRWy50gBEw4ErQew95cxRPI 2mFfIe62oF/SlolTIjW5Ocw1cuGDtl6jeuOXDWgiM4ZU/ZbqRDQhX9Zo/vgOEFh8 3sWH7Nu8P2B1owZOugMoC7ZtZym027KQb8gEg34NiUEumBvIL7jlwqqanYvatxZj IpZMU+w+8cBd5zc64ax8uvQQ7t3NyzCcfNKGuhzoCCFRT2Z1qI2TAyfCb9qR3gE+ Zrf2B1CNXpYoZFPuX7kmCK5exNY74jDuaEXytBvQ8P8S5jA8nQ89DlF623ID7ngn RsdH5dq/N9KnpLEOLWEZ =3s2E -----END PGP SIGNATURE-----
--vv4Sf/kQfcwinyKX--
--===============3276580009360456923== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============3276580009360456923==--
|
|
|
|