drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Linux
Name: |
Mehrere Probleme in Linux |
|
ID: |
USN-4709-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 16.04 LTS, Ubuntu 14.04 ESM |
|
Datum: |
Do, 28. Januar 2021, 16:07 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28374
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25669 |
|
Applikationen: |
Linux |
|
Originalnachricht |
--===============7096031313989688660== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="6qFdnjy6dKaiDX/E" Content-Disposition: inline
--6qFdnjy6dKaiDX/E Content-Type: text/plain; charset=us-ascii Content-Disposition: inline
========================================================================== Ubuntu Security Notice USN-4709-1 January 28, 2021
linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS - Ubuntu 14.04 ESM
Summary:
Several security issues were fixed in the Linux kernel.
Software Description: - linux-kvm: Linux kernel for cloud environments - linux-raspi2: Linux kernel for Raspberry Pi (V8) systems - linux-snapdragon: Linux kernel for Qualcomm Snapdragon processors - linux-aws: Linux kernel for Amazon Web Services (AWS) systems
Details:
It was discovered that the LIO SCSI target implementation in the Linux kernel performed insufficient identifier checking in certain XCOPY requests. An attacker with access to at least one LUN in a multiple backstore environment could use this to expose sensitive information or modify data. (CVE-2020-28374)
Wen Xu discovered that the XFS filesystem implementation in the Linux kernel did not properly track inode validations. An attacker could use this to construct a malicious XFS image that, when mounted, could cause a denial of service (system crash). (CVE-2018-13093)
It was discovered that the btrfs file system implementation in the Linux kernel did not properly validate file system metadata in some situations. An attacker could use this to construct a malicious btrfs image that, when mounted, could cause a denial of service (system crash). (CVE-2019-19813, CVE-2019-19816)
Bodong Zhao discovered a use-after-free in the Sun keyboard driver implementation in the Linux kernel. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2020-25669)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04 LTS: linux-image-4.4.0-1087-kvm 4.4.0-1087.96 linux-image-4.4.0-1145-raspi2 4.4.0-1145.155 linux-image-4.4.0-1149-snapdragon 4.4.0-1149.159 linux-image-kvm 4.4.0.1087.85 linux-image-raspi2 4.4.0.1145.145 linux-image-snapdragon 4.4.0.1149.141
Ubuntu 14.04 ESM: linux-image-4.4.0-1085-aws 4.4.0-1085.89 linux-image-aws 4.4.0.1085.82
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: https://usn.ubuntu.com/4709-1 CVE-2018-13093, CVE-2019-19813, CVE-2019-19816, CVE-2020-25669, CVE-2020-28374
Package Information: https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1087.96 https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1145.155 https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1149.159
--6qFdnjy6dKaiDX/E Content-Type: application/pgp-signature; name="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQIzBAABCgAdFiEEpgY7tWAjCaQ8jrvULwmejQBegfQFAmASZHcACgkQLwmejQBe gfSnvxAAh/GsLpDxNNciLp7oq+SowP6ps4/8+k0BskCAwrUQI+UUnH8r4TvySstk C7lQn6q1hHXoJmUmkafLF2UF7V6KfyA+FZpJprkQ8d9hRMFX2+IzItlCl5DGxUNZ Lmv0INvnB0sf+/PpXZzAHR87dFi4oW37UUSjwyLhga9BPVtEdLeZzoO5RccHKaWL rdQW7FTKrNgovmV9O2QFNkLEJevogzJH+Dz/kYCYhaGsi6gsVg+c2zxphR+bVgfA 2Hl/YIjYS2Bu19n8rxmS+lMZ1hjqrZViv3K2/KHvvBYLpxxH2q2H66G3vABhpkH0 xEqaai3uJAMu3mY/o3mAU+3fdE2kUI4hTbHuhmqTWOsYC0dKaywnQeTF4t+y0UPT 8pNWD4F2iLdKFMPrTLHsYAduxsQvZhjFnuBhXZH2z6d7zoV9gpyS2ZHzvShfwzYD 48Q7aVlT9oMmqUplEGr4aGOUp/mOCjCipJxgn3WNCAX3WiEcIDw9F8UpNOhHas3g AWdSitk1/PKAOi0ql8cXAqC//JCmjlwHVhsWop+JZzXmZYDOHNItgxpTloa+3Nfh x4JT0opnZbPOTixlXddf9npA8QphR7UL7rMdUE8ppF9Mm5O1mS/YvwWScIVAbdsc IutLVESvM8Ka6CzwPLCutsz6Qea8KeyHU8UcPFSOipF/81otEYw= =/VEt -----END PGP SIGNATURE-----
--6qFdnjy6dKaiDX/E--
--===============7096031313989688660== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
|
|
|
|