drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Denial of Service in Linux
Name: |
Denial of Service in Linux |
|
ID: |
USN-6706-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 22.04 LTS |
|
Datum: |
Mi, 20. März 2024, 22:59 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6039 |
|
Applikationen: |
Linux |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============0059442305689796896== Content-Language: en-US Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------OeJKW3xyMv0CjmreJYMmhIA6"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------OeJKW3xyMv0CjmreJYMmhIA6 Content-Type: multipart/mixed; boundary="------------ltIRQ0uSeYlvLE5kSJmCE0hR"; protected-headers="v1" From: Rodrigo Figueiredo Zaiden <rodrigo.zaiden@canonical.com> Reply-To: security@ubuntu.com To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <aeaa07e3-c020-4dbf-82e9-05b844d1bf6d@canonical.com> Subject: [USN-6706-1] Linux kernel (OEM) vulnerability
--------------ltIRQ0uSeYlvLE5kSJmCE0hR Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64
========================================================================== Ubuntu Security Notice USN-6706-1 March 20, 2024
linux-oem-6.1 vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
Summary:
The system could be made to crash under certain conditions.
Software Description: - linux-oem-6.1: Linux kernel for OEM systems
Details:
It was discovered that the Microchip USB Ethernet driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could use this to cause a denial of service (system crash).
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.04 LTS: linux-image-6.1.0-1036-oem 6.1.0-1036.36 linux-image-oem-22.04a 6.1.0.1036.37 linux-image-oem-22.04b 6.1.0.1036.37 linux-image-oem-22.04c 6.1.0.1036.37
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: https://ubuntu.com/security/notices/USN-6706-1 CVE-2023-6039
Package Information: https://launchpad.net/ubuntu/+source/linux-oem-6.1/6.1.0-1036.36
--------------ltIRQ0uSeYlvLE5kSJmCE0hR--
--------------OeJKW3xyMv0CjmreJYMmhIA6 Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature.asc"
-----BEGIN PGP SIGNATURE-----
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmX7LdcFAwAAAAAACgkQZ0GeRcM5nt0R 3QgArJmTYHZoTbNe7+bu3kvLv2HDgoKTUcDEIW1mGoSrA14Wn441PRJEecRwORSRabQ452Tgu9+3 v0hVgWM0y1iWoj/zSrUAS2yXC3DeXcqKTH2Q/ok8FyZCXvfSaCpXfNQJ6P9Mkca3fClNnfDkm8Db MSNPhne5XUbjCtov+W9HWof28LzPJjFwp0UlYcDP0f8O3OkVPLR8dgQedoN833EMejpZHRGROGrB 6Qp/wRqOgGxmXxo//Is26pTvrGVwsyf2t5aEhbg/5Z+F9rM7OACYZolTyq09/K1X46BeXdm1kmDR Kh9xclPFGaYhFt2ttxeiqoUDWPTxMecCh5sUtyskUg== =ginw -----END PGP SIGNATURE-----
--------------OeJKW3xyMv0CjmreJYMmhIA6--
--===============0059442305689796896== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============0059442305689796896==--
|
|
|
|