You are here
Home > Preporuke > Sigurnosni nedostatak jezgre operacijskog sustava

Sigurnosni nedostatak jezgre operacijskog sustava

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-3292-1
May 17, 2017

linux, linux-raspi2 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 16.10

Summary:

The system could be made to crash or run programs as an administrator.

Software Description:
– linux: Linux kernel
– linux-raspi2: Linux kernel for Raspberry Pi 2

Details:

Jason Donenfeld discovered a heap overflow in the MACsec module in the
Linux kernel. An attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.10:
linux-image-4.8.0-1036-raspi2 4.8.0-1036.39
linux-image-4.8.0-52-generic 4.8.0-52.55
linux-image-4.8.0-52-generic-lpae 4.8.0-52.55
linux-image-4.8.0-52-lowlatency 4.8.0-52.55
linux-image-4.8.0-52-powerpc-e500mc 4.8.0-52.55
linux-image-4.8.0-52-powerpc-smp 4.8.0-52.55
linux-image-4.8.0-52-powerpc64-emb 4.8.0-52.55
linux-image-generic 4.8.0.52.64
linux-image-generic-lpae 4.8.0.52.64
linux-image-lowlatency 4.8.0.52.64
linux-image-powerpc-e500mc 4.8.0.52.64
linux-image-powerpc-smp 4.8.0.52.64
linux-image-powerpc64-emb 4.8.0.52.64
linux-image-raspi2 4.8.0.1036.40

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
http://www.ubuntu.com/usn/usn-3292-1
CVE-2017-7477

Package Information:
https://launchpad.net/ubuntu/+source/linux/4.8.0-52.55
https://launchpad.net/ubuntu/+source/linux-raspi2/4.8.0-1036.39

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=f/B5
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-3292-2
May 17, 2017

linux-hwe vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 16.04 LTS

Summary:

The system could be made to crash or run programs as an administrator.

Software Description:
– linux-hwe: Linux hardware enablement (HWE) kernel

Details:

USN-3292-1 fixed a vulnerability in the Linux kernel for Ubuntu 16.10.
This update provides the corresponding updates for the Linux Hardware
Enablement (HWE) kernel from Ubuntu 16.10 for Ubuntu 16.04 LTS.

Jason Donenfeld discovered a heap overflow in the MACsec module in the
Linux kernel. An attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
linux-image-4.8.0-52-generic 4.8.0-52.55~16.04.1
linux-image-4.8.0-52-generic-lpae 4.8.0-52.55~16.04.1
linux-image-4.8.0-52-lowlatency 4.8.0-52.55~16.04.1
linux-image-generic-hwe-16.04 4.8.0.52.23
linux-image-generic-lpae-hwe-16.04 4.8.0.52.23
linux-image-lowlatency-hwe-16.04 4.8.0.52.23

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
http://www.ubuntu.com/usn/usn-3292-2
http://www.ubuntu.com/usn/usn-3292-1
CVE-2017-7477

Package Information:
https://launchpad.net/ubuntu/+source/linux-hwe/4.8.0-52.55~16.04.1

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=zeFM
—–END PGP SIGNATURE—–

AutorDanijel Kozinovic
Cert idNCERT-REF-2017-05-0031-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci jezgre operacijskog sustava

Otkriveni su sigurnosni nedostaci u radu programske jezgre operacijskog sustava Ubuntu 16.04 LTS. Otkriveni nedostaci potencijalnim napadačima omogućuju izvođenje napada...

Close