Login
Newsletter
Werbung

Sicherheit: Denial of Service in Linux
Aktuelle Meldungen Distributionen
Name: Denial of Service in Linux
ID: USN-4462-1
Distribution: Ubuntu
Plattformen: Ubuntu 18.04 LTS
Datum: Di, 18. August 2020, 22:49
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12771
Applikationen: Linux

Originalnachricht


--===============2443574298697404918==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="MW5yreqqjyrRcusr"
Content-Disposition: inline


--MW5yreqqjyrRcusr
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-4462-1
August 18, 2020

linux-gke-5.0, linux-oem-osp1 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS

Summary:

The system could be made to crash under certain conditions.

Software Description:
- linux-gke-5.0: Linux kernel for Google Container Engine (GKE) systems
- linux-oem-osp1: Linux kernel for OEM systems

Details:

It was discovered that the bcache subsystem in the Linux kernel did not
properly release a lock in some error conditions. A local attacker could
possibly use this to cause a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
linux-image-5.0.0-1046-gke 5.0.0-1046.47
linux-image-5.0.0-1067-oem-osp1 5.0.0-1067.72
linux-image-gke-5.0 5.0.0.1046.31
linux-image-oem-osp1 5.0.0.1067.65

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://usn.ubuntu.com/4462-1
CVE-2020-12771

Package Information:
https://launchpad.net/ubuntu/+source/linux-gke-5.0/5.0.0-1046.47
https://launchpad.net/ubuntu/+source/linux-oem-osp1/5.0.0-1067.72


--MW5yreqqjyrRcusr
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=QCma
-----END PGP SIGNATURE-----

--MW5yreqqjyrRcusr--


--===============2443574298697404918==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung