drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in Linux
Name: |
Ausführen beliebiger Kommandos in Linux |
|
ID: |
USN-4343-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 20.04 LTS |
|
Datum: |
Mi, 29. April 2020, 07:28 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11884 |
|
Applikationen: |
Linux |
|
Originalnachricht |
--===============2927734748517535869== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="GTGEtWEe6jD60dxL" Content-Disposition: inline
--GTGEtWEe6jD60dxL Content-Type: text/plain; charset=us-ascii Content-Disposition: inline
========================================================================== Ubuntu Security Notice USN-4343-1 April 28, 2020
linux vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
Summary:
Systems running on s390x architecture could be made to crash or run programs as an administrator under certain conditions.
Software Description: - linux: Linux kernel
Details:
Al Viro discovered that the Linux kernel for s390x systems did not properly perform page table upgrades for kernel sections that use secondary address mode. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.04 LTS: linux-image-5.4.0-28-generic 5.4.0-28.32 linux-image-5.4.0-28-generic-lpae 5.4.0-28.32 linux-image-5.4.0-28-lowlatency 5.4.0-28.32 linux-image-generic 5.4.0.28.33 linux-image-generic-lpae 5.4.0.28.33 linux-image-lowlatency 5.4.0.28.33 linux-image-oem 5.4.0.28.33 linux-image-oem-osp1 5.4.0.28.33 linux-image-virtual 5.4.0.28.33
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: https://usn.ubuntu.com/4343-1 CVE-2020-11884
Package Information: https://launchpad.net/ubuntu/+source/linux/5.4.0-28.32
--GTGEtWEe6jD60dxL Content-Type: application/pgp-signature; name="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQIzBAABCgAdFiEEpgY7tWAjCaQ8jrvULwmejQBegfQFAl6oySgACgkQLwmejQBe gfTg2w//bqZnrtSPdiXi02szavMI0QSYYlrSiCzTDtK6jlCPf1CyU6B2c1hAiPLq iqVYXeNnFnoO1vXShh0NXc3juuWIe01FDKEiyBZQUCkdoPD+eqSjHWN1ID/uc1JA TUC2CIGmhHw2tcL8mKdjbXltdAyruLdnWPQKfJoMBarzlzYoG4PF/Midon+nT1+u M+HK61aNLzJFVn0pVPxAUACUx82Ayzdz5LtsjsFdr0U+g1/NUZ2qObh7EJKZt5iF iycxtZ3z67M7Un2W49j0CcEopsY2XVBj09C2wcTU3EL+wbbTbvd2LW+4h3pkE1pF +36esWSFf5qwoytknhafF7RhpMNAZnDLL3dPxCvCO8DM7IKy0f+pTxpEqhj2K7M1 SrHVdXzVnrNwEjicdDPjjbk9fQnYPeoIW+qAIA+bx7unOx9lHtufgQ+DHknoNvFS cyoibEXHJjukTB6NO3nN5e29XrYq5NV2tiMCpPQAcu1gCVtmJAcs0W/pG3a/37o9 ldbkvneaxOEY5syl97rzh2/W52afYmc0LebDB5LBEKyr24g86GzwgC/9gadl3eiS TQsuZAYgzbyVcPlDZH5orA1XFYqgKDvaVeKUunmG6RsnFgviy7hL+LjVzO6vixEk xmKlxy5Y3jV4Sf99fMA/BGN+JsiaCZTZ5yyuVydpg4E98qDO8YI= =V4vH -----END PGP SIGNATURE-----
--GTGEtWEe6jD60dxL--
--===============2927734748517535869== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
|
|
|
|