drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Denial of Service in Linux
Name: |
Denial of Service in Linux |
|
ID: |
USN-2314-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 14.04 LTS |
|
Datum: |
Mi, 13. August 2014, 13:39 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3917 |
|
Applikationen: |
Linux |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============3683506997269592866== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="374amEJgrxsFrH4rJFdIOmIhUGuAqanFa"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --374amEJgrxsFrH4rJFdIOmIhUGuAqanFa Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-2314-1 August 13, 2014
linux vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
The system could be made to crash under certain conditions.
Software Description: - linux: Linux kernel
Details:
An flaw was discovered in the Linux kernel's audit subsystem when auditing certain syscalls. A local attacker could exploit this flaw to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS).
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04 LTS: linux-image-3.13.0-33-generic 3.13.0-33.58 linux-image-3.13.0-33-generic-lpae 3.13.0-33.58 linux-image-3.13.0-33-lowlatency 3.13.0-33.58 linux-image-3.13.0-33-powerpc-e500 3.13.0-33.58 linux-image-3.13.0-33-powerpc-e500mc 3.13.0-33.58 linux-image-3.13.0-33-powerpc-smp 3.13.0-33.58 linux-image-3.13.0-33-powerpc64-emb 3.13.0-33.58 linux-image-3.13.0-33-powerpc64-smp 3.13.0-33.58
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. If you use linux-restricted-modules, you have to update that package as well to get modules which work with the new kernel version. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-server, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: http://www.ubuntu.com/usn/usn-2314-1 CVE-2014-3917
Package Information: https://launchpad.net/ubuntu/+source/linux/3.13.0-33.58
--374amEJgrxsFrH4rJFdIOmIhUGuAqanFa Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBCgAGBQJT60UWAAoJEAUvNnAY1cPYlc8QAJkyjZaY+JfnAtLpEGJ8EPZL IAyJB56IX1IJRfVnOe+/GVQeXUkDY8AAnLpkRTEZIKvMhw+xkP9Pnx+G+O+5Zm0W qIgOU6ajKJ7tfYrhdcpdMXE/wXBGsDMmDRSLib5M8C4HeNt58RA7NWEM6HtbKXov VrlnHdCqBxLD1A5QCybfAsmPqnmiVu+kFEksH5W9WOa4D83ZhR/MiS+wFx9cYWbb u/G7truEl/uqJbr2Jar8HK/4BS7Lb+Wr2FEJ738Gg200uzggAC7iTKL7gjDs4+3O BI4FwhDwu2eY5sH9YTghRM3NIXl48Pid8fAU5LyQJMQsLiNwlQhZo/YyaftUj/3F BNmwvaitOoXbv06k6S//Extymi7x6ecZxdO7pKvp9/LptNJjytD2qrZSrGJRx7B8 bntnOGSNZCaXvbRsUJvQ2sKwZVZ6U237/90fdazBVMUY4XO74MNjwSVpTqFR9dJC v9lQ/QPoUevCh4oNMaIw6CRQzmkEb7R/u3DWZ+CYYVTuv6NCnobVEk8J+2WkjyOQ 6iuVCcUUDTywoKaFTYU4p6loaXXzc6znXdxxwARSEKUqnAWlucKDIYxn282zYrqh 8QSQxBRs/kHIpkuTDX0zrHWGEn/vyg70RlMqk9l/9wNIbNrHzGKh1OLUhQ7qR2Ek GQnD8Cy7yVKnUG+vwxCe =0yim -----END PGP SIGNATURE-----
--374amEJgrxsFrH4rJFdIOmIhUGuAqanFa--
--===============3683506997269592866== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============3683506997269592866==--
|
|
|
|