1. Server >
  2. Unix Server


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

Unix Server


Suchen

News RSS Quellen: 8x
News Kategorien unterhalb von Unix Server: 0x
News RSS Feeds dieser Unix Server Kategorie: RSS Feed Unix Server
Benutze Feedly zum Abonieren.Folge uns auf feedly
Download RSS Feed App für Windows 10 Store (Leider gibt es nicht mehr viele Extensions mit welchen Sie RSS-Feeds in einer Software abonieren können. Der Browser Support für RSS-Feeds wurde eingestellt (Firefox,Chrome).

Eigene IT Security Webseite / Blog / Quelle hinzufügen

Seitennavigation

Seite 92 von 144 Seiten (Bei Beitrag 3185 - 3220)
5.010x Beiträge in dieser Kategorie

Auf Seite 91 zurück | Nächste 93 Seite | Letzte Seite

[ 87 ] [ 88 ] [ 89 ] [ 90 ] [ 91 ] [92] [ 93 ] [ 94 ] [ 95 ] [ 96 ] [ 97 ] [ 98 ] [ 99 ] [ 100 ] [ 101 ] [ 102 ]

USN-3537-1: MySQL vulnerabilities

Zur Kategorie wechselnUnix Server vom | Quelle: ubuntu.com Direktlink direkt öffnen

Ubuntu Security Notice USN-3537-1

22nd January, 2018

mysql-5.5, mysql-5.7 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in MySQL.

Software description

  • mysql-5.5 - MySQL database
  • mysql-5.7 - MySQL database

Details

Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated to 5.5.59 in Ubuntu 14.04 LTS. Ubuntu 16.04 LTS,
and Ubuntu 17.10 have been updated to MySQL 5.7.21.

In addition to security fixes, the updated packages contain bug fixes,
new features, and possibly incompatible changes.

Please see the following for more information:
http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-59.html
http://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-21.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 17.10:
mysql-server-5.7 5.7.21-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
mysql-server-5.7 5.7.21-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
mysql-server-5.5 5.5.59-0ubuntu0.14.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2018-2562, CVE-2018-2565, CVE-2018-2573, CVE-2018-2576, CVE-2018-2583, CVE-2018-2586, CVE-2018-2590, CVE-2018-2600, CVE-2018-2612, CVE-2018-2622, CVE-2018-2640, CVE-2018-2645, CVE-2018-2646, CVE-2018-2647, CVE-2018-2665, CVE-2018-2667, CVE-2018-2668, CVE-2018-2696, CVE-2018-2703


News Bewertung

Weiterlesen Weiterlesen

USN-3538-1: OpenSSH vulnerabilities

Zur Kategorie wechselnUnix Server vom | Quelle: ubuntu.com Direktlink direkt öffnen

Ubuntu Security Notice USN-3538-1

22nd January, 2018

openssh vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in OpenSSH.

Software description

  • openssh - secure shell (SSH) for secure access to remote machines

Details

Jann Horn discovered that OpenSSH incorrectly loaded PKCS#11 modules from
untrusted directories. A remote attacker could possibly use this issue to
execute arbitrary PKCS#11 modules. This issue only affected Ubuntu 14.04
LTS and Ubuntu 16.04 LTS. (CVE-2016-10009)

Jann Horn discovered that OpenSSH incorrectly handled permissions on
Unix-domain sockets when privilege separation is disabled. A local attacker
could possibly use this issue to gain privileges. This issue only affected
Ubuntu 16.04 LTS. (CVE-2016-10010)

Jann Horn discovered that OpenSSH incorrectly handled certain buffer memory
operations. A local attacker could possibly use this issue to obtain
sensitive information. This issue only affected Ubuntu 14.04 LTS and Ubuntu
16.04 LTS. (CVE-2016-10011)

Guido Vranken discovered that OpenSSH incorrectly handled certain shared
memory manager operations. A local attacker could possibly use issue to
gain privileges. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04
LTS. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS.
(CVE-2016-10012)

Michal Zalewski discovered that OpenSSH incorrectly prevented write
operations in readonly mode. A remote attacker could possibly use this
issue to create zero-length files, leading to a denial of service.
(CVE-2017-15906)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 17.10:
openssh-server 1:7.5p1-10ubuntu0.1
Ubuntu 16.04 LTS:
openssh-server 1:7.2p2-4ubuntu2.4
Ubuntu 14.04 LTS:
openssh-server 1:6.6p1-2ubuntu2.10

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2016-10009, CVE-2016-10010, CVE-2016-10011, CVE-2016-10012, CVE-2017-15906


News Bewertung

Weiterlesen Weiterlesen

USN-3531-2: Intel Microcode regression

Zur Kategorie wechselnUnix Server vom | Quelle: ubuntu.com Direktlink direkt öffnen

Ubuntu Security Notice USN-3531-2

22nd January, 2018

intel-microcode regression

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

USN-3531-1 introduced regressions in intel-microcode.

Software description

  • intel-microcode - Processor microcode for Intel CPUs

Details

USN-3531-1 updated Intel microcode to the 20180108 release. Regressions
were discovered in the microcode updates which could cause system
instability on certain hardware platforms. At the request of Intel, we have
reverted to the previous packaged microcode version, the 20170707 release.

Original advisory details:

It was discovered that microprocessors utilizing speculative execution
and branch prediction may allow unauthorized memory reads via sidechannel
attacks. This flaw is known as Spectre. A local attacker could use this to
expose sensitive information, including kernel memory. (CVE-2017-5715)

This update provides the microcode updates required for the corresponding
Linux kernel updates.

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 17.10:
intel-microcode 3.20180108.0+really20170707ubuntu17.10.1
Ubuntu 16.04 LTS:
intel-microcode 3.20180108.0+really20170707ubuntu16.04.1
Ubuntu 14.04 LTS:
intel-microcode 3.20180108.0+really20170707ubuntu14.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

LP: 1742933


News Bewertung

Weiterlesen Weiterlesen

DSA-4094 smarty3 - security update

Zur Kategorie wechselnUnix Server vom | Quelle: debian.org Direktlink direkt öffnen

It was discovered that Smarty, a PHP template engine, was vulnerable to code-injection attacks. An attacker was able to craft a filename in comments that could lead to arbitrary code execution on the host running Smarty.


News Bewertung

Weiterlesen Weiterlesen

DSA-4093 openocd - security update

Zur Kategorie wechselnUnix Server vom | Quelle: debian.org Direktlink direkt öffnen

Josef Gajdusek discovered that OpenOCD, a JTAG debugger for ARM and MIPS, was vulnerable to Cross Protocol Scripting attacks. An attacker could craft a HTML page that, when visited by a victim running OpenOCD, could execute arbitrary commands on the victims host.


News Bewertung

Weiterlesen Weiterlesen

CentOS Seven blog: Updated CentOS Vagrant Images Available (v1801.01)

Zur Kategorie wechselnUnix Server vom | Quelle: seven.centos.org Direktlink direkt öffnen

We are pleased to announce new official Vagrant images of CentOS Linux 6.9 and CentOS Linux 7.4.1708 for x86_64 (based on the sources of RHEL 7.4). All included packages have been updated to 9 January 2017 and include important fixes for the Meltdown and Spectre vulnerabilities affecting modern processors.

Known Issues

  1. The VirtualBox Guest Additions are not preinstalled; if you need them for shared folders, please install the vagrant-vbguest plugin and add the following line to your Vagrantfile:
    config.vm.synced_folder ".", "/vagrant", type: "virtualbox"

    We recommend using NFS instead of VirtualBox shared folders if possible; you can also use the vagrant-sshfs plugin, which, unlike NFS, works on all operating systems.

  2. Since the Guest Additions are missing, our images are preconfigured to use rsync for synced folders. Windows users can either use SMB for synced folders, or disable the sync directory by adding the line
    config.vm.synced_folder ".", "/vagrant", disabled: true

    to their Vagrantfile, to prevent errors on "vagrant up".

  3. Vagrant 1.8.5 is unable to create new CentOS Linux boxes due to Vagrant bug #7610
  4. Vagrant 1.8.7 is unable to download or update boxes due to Vagrant bug #7969.
  5. Vagrant 1.9.1 broke private networking, see Vagrant bug #8166
  6. Vagrant 1.9.3 doesn't work with SMB sync due to Vagrant bug #8404
  7. The vagrant-libvirt plugin is only compatible with Vagrant 1.5 to 1.8
  8. Installing open-vm-tools is not enough for enabling shared folders with Vagrant’s VMware provider. Please follow the detailed instructions in https://github.com/mvermaes/centos-vmware-tools (updated for this release).
  9. Some people reported "could not resolve host" errors when running the centos/7 image for VirtualBox on Windows hosts. Try adding the following line to your Vagrantfile:
    vb.customize ["modifyvm", :id, "--natdnshostresolver1", "off"]

Recommended Setup on the Host

Our automatic testing is running on a CentOS Linux 7 host, using Vagrant 1.9.4 with vagrant-libvirt and VirtualBox 5.1.20 (without the Guest Additions) as providers. We strongly recommend using the libvirt provider when stability is required.

Downloads

The official images can be downloaded from Vagrant Cloud. We provide images for HyperV, libvirt-kvm, VirtualBox and VMware.

If you never used our images before:

vagrant box add centos/6 # for CentOS Linux 6, or...
vagrant box add centos/7 # for CentOS Linux 7

Existing users can upgrade their images:

vagrant box update --box centos/6
vagrant box update --box centos/7

Verifying the integrity of the images

The SHA256 checksums of the images are signed with the CentOS 7 Official Signing Key. First, download and verify the checksum file:

$ curl http://cloud.centos.org/centos/7/vagrant/x86_64/images/sha256sum.txt.asc -o sha256sum.txt.asc
$ gpg --verify sha256sum.txt.asc

If the check passed, you can use the corresponding checksum when downloading the image with Vagrant:

$ vagrant box add --checksum-type sha256 --checksum 9252202d58fab4b65ac52906ace709634407368c5571ba4df092c244a882df54 --provider libvirt --box-version 1801.01 centos/7

Feedback

If you encounter any unexpected issues with the Vagrant images, feel free to ask on the centos-devel mailing list, or via IRC, in #centos on Freenode.

Ackowledgements

We would like to warmly thank Fabian Arrotin and Thomas Oulevey for their work on the build infrastructure, as well as Patrick Lang from Microsoft for testing and feedback on the Hyper-V images.

We would also like to thank the following people (listed alphabetically):

  • Graham Mainwaring, for helping with tests and validations;
  • Michael Vermaes, for testing our official images, as well as for writing the detailed guide to using them with VMware Fusion Pro and VMware Workstation Pro;
  • Kirill Kalachev, for reporting and debugging the host name errors with VirtualBox on Windows hosts.

News Bewertung

Weiterlesen Weiterlesen

CentOS Web Panel 0.9.8.12 Cross Site Scripting

Zur Kategorie wechselnUnix Server vom | Quelle: packetstormsecurity.com Direktlink direkt öffnen

CentOS Web Panel version 0.9.8.12 suffers from multiple cross site scripting vulnerabilities.
News Bewertung

Weiterlesen Weiterlesen

CentOS Seven blog: Updated CentOS Vagrant Images Available (v1801.01)

Zur Kategorie wechselnUnix Server vom | Quelle: blog.centos.org Direktlink direkt öffnen

We are pleased to announce new official Vagrant images of CentOS Linux 6.9 and CentOS Linux 7.4.1708 for x86_64 (based on the sources of RHEL 7.4). All included packages have been updated to 9 January 2017 and include important fixes for the Meltdown and Spectre vulnerabilities affecting modern processors.

Known Issues

  1. The VirtualBox Guest Additions are not preinstalled; if you need them for shared folders, please install the vagrant-vbguest plugin and add the following line to your Vagrantfile:
    config.vm.synced_folder ".", "/vagrant", type: "virtualbox"

    We recommend using NFS instead of VirtualBox shared folders if possible; you can also use the vagrant-sshfs plugin, which, unlike NFS, works on all operating systems.

  2. Since the Guest Additions are missing, our images are preconfigured to use rsync for synced folders. Windows users can either use SMB for synced folders, or disable the sync directory by adding the line
    config.vm.synced_folder ".", "/vagrant", disabled: true

    to their Vagrantfile, to prevent errors on "vagrant up".

  3. Vagrant 1.8.5 is unable to create new CentOS Linux boxes due to Vagrant bug #7610
  4. Vagrant 1.8.7 is unable to download or update boxes due to Vagrant bug #7969.
  5. Vagrant 1.9.1 broke private networking, see Vagrant bug #8166
  6. Vagrant 1.9.3 doesn't work with SMB sync due to Vagrant bug #8404
  7. The vagrant-libvirt plugin is only compatible with Vagrant 1.5 to 1.8
  8. Installing open-vm-tools is not enough for enabling shared folders with Vagrant’s VMware provider. Please follow the detailed instructions in https://github.com/mvermaes/centos-vmware-tools (updated for this release).
  9. Some people reported "could not resolve host" errors when running the centos/7 image for VirtualBox on Windows hosts. Try adding the following line to your Vagrantfile:
    vb.customize ["modifyvm", :id, "--natdnshostresolver1", "off"]

Recommended Setup on the Host

Our automatic testing is running on a CentOS Linux 7 host, using Vagrant 1.9.4 with vagrant-libvirt and VirtualBox 5.1.20 (without the Guest Additions) as providers. We strongly recommend using the libvirt provider when stability is required.

Downloads

The official images can be downloaded from Vagrant Cloud. We provide images for HyperV, libvirt-kvm, VirtualBox and VMware.

If you never used our images before:

vagrant box add centos/6 # for CentOS Linux 6, or...
vagrant box add centos/7 # for CentOS Linux 7

Existing users can upgrade their images:

vagrant box update --box centos/6
vagrant box update --box centos/7

Verifying the integrity of the images

The SHA256 checksums of the images are signed with the CentOS 7 Official Signing Key. First, download and verify the checksum file:

$ curl http://cloud.centos.org/centos/7/vagrant/x86_64/images/sha256sum.txt.asc -o sha256sum.txt.asc
$ gpg --verify sha256sum.txt.asc

If the check passed, you can use the corresponding checksum when downloading the image with Vagrant:

$ export box_checksum="4440a10744855ec2819d726074958ad6cff56bb5a616f6a45b0a42d602aa1154"
$ vagrant box add --checksum-type sha256 --checksum $box_checksum --provider libvirt --box-version 1801.02 centos/7

Feedback

If you encounter any unexpected issues with the Vagrant images, feel free to ask on the centos-devel mailing list, or via IRC, in #centos on Freenode.

Ackowledgements

We would like to warmly thank Fabian Arrotin and Thomas Oulevey for their work on the build infrastructure, as well as Patrick Lang from Microsoft for testing and feedback on the Hyper-V images.

We would also like to thank the following people (listed alphabetically):

  • Graham Mainwaring, for helping with tests and validations;
  • Michael Vermaes, for testing our official images, as well as for writing the detailed guide to using them with VMware Fusion Pro and VMware Workstation Pro;
  • Kirill Kalachev, for reporting and debugging the host name errors with VirtualBox on Windows hosts.

Update : this blog post was updated on January Wednesday 24th to reflect different checksum as the image to use is 1801_02


News Bewertung

Weiterlesen Weiterlesen

DSA-4092 awstats - security update

Zur Kategorie wechselnUnix Server vom | Quelle: debian.org Direktlink direkt öffnen

The cPanel Security Team discovered that awstats, a log file analyzer, was vulnerable to path traversal attacks. A remote unauthenticated attacker could leverage that to perform arbitrary code execution.


News Bewertung

Weiterlesen Weiterlesen

Fabian Arrotin: Diagnosing nf_conntrack/nf_conntrack_count issues on CentOS mirrorlist nodes

Zur Kategorie wechselnUnix Server vom | Quelle: arrfab.net Direktlink direkt öffnen

Yesterday, I got some alerts for some nodes in the CentOS Infra from both our monitoring system, but also confirmed by some folks reporting errors directly in our #centos-devel irc channel on Freenode.

The impacted nodes were the nodes we use for mirrorlist service. For people not knowing what they are used for, here is a quick overview of what happens when you run "yum update" on your CentOS node :

  • yum analyzes the .repo files contained under /etc/yum.repos.d/
  • for CentOS repositories, it knows that it has to use a list of mirrors provided by a server hosted within the centos infra (mirrorlist=http://mirrorlist.centos.org/?release=$releasever&arch=$basearch&repo=updates&infra=$infra )
  • yum then contacts one of the server behind "mirrorlist.centos.org" (we have 4 nodes so far : two in Europe and two in USA, all available over IPv4 and IPv6)
  • mirrorlist checks the src ip and sends back a list of current/up2date mirrors in the country (some GeoIP checks are done)
  • yum then opens connection to those validated mirrors

We monitor the response time for those services, and average response time is usually < 1sec (with some exceptions, mostly due to network latency also for nodes in other continents). But yesterday the values where not only higher, but also even completely missing from our monitoring system, so no data received. Here is a graph from our monitoring/Zabbix server :

mirrorlist-response-time-error.png

So clearly something was happening and time to also find some patterns. Also from our monitoring we discovered that the number of tracked network connections by the kernel was also suddenly higher than usual. In fact, as soon as your node does some state tracking with netfilter (like for example -m state ESTABLISHED,RELATED ), it keeps that in memory. You can easily retrive number of actively tracked connections like this :

cat /proc/sys/net/netfilter/nf_conntrack_count 

So it's easy to guess what happens if the max (/proc/sys/net/netfilter/nf_conntrack_max) is reached : kernel drops packets (from dmesg):

nf_conntrack: table full, dropping packet

Depending on the available memory, you can get default values, which can be changed in real-time. Don't forget to also tune then the Hash size (basic rule is nf_conntrack_max / 4) On the mirrorlist nodes, we had default values of 262144 (so yeah, keeping track of that amount of connections in memory), so to get quickly the service in shape :

new_number="524288"
echo ${new_number} > /proc/sys/net/netfilter/nf_conntrack_max
echo $(( $new_number / 4 )) > /sys/module/nf_conntrack/parameters/hashsize

Other option was also to flush the table (you can do that with conntrack -F , tool from conntrack-tools package) but it's really only a temporary fix, and that will not help you getting the needed info for proper troubleshooting (see below)

Here is the Zabbix graph showing that for some nodes it was higher than default values, but now kernel wasn't dropping packets.

ip_conntrack_count.png

We could then confirm that service was then working fine (not "flapping" anymore).

So one can think that it was the only solution for the problem and stop investigation there. But what is the root cause of this ? What happened that opened so many (unclosed) connections to those mirrorlist nodes ? Let's dive into nf_conntrack table again !

Not only you have the number of tracked connections (through /proc/sys/net/netfilter/nf_conntrack_count) but also the whole details about those. So let's dump that into a file for full analysis and try to find a pattern :

cat /proc/net/nf_conntrack > conntrack.list
cat conntrack.list |awk '{print $7}'|sed 's/src=//g'|sort|uniq -c|sort -n -r|head

Here we go : same range of IPs on all our mirrorlist servers having thousands of ESTABLISHED connection. Not going to give you all details about this (goal of this blog post isn't "finger pointing"), but we suddenly identified the issue. So we took contact with network team behind those identified IPs to report that behaviour, still to be tracked, but wondering myself if a Firewall doing NAT wasn't closing tcp connections at all, more to come.

At least mirrorlist response time is now back at usual state :

mirrorlist-response-time.png

So you can also let your configuration management now set those parameters through dedicated .conf under /etc/systctl.d/ to ensure that they'll be applied automatically.


News Bewertung

Weiterlesen Weiterlesen

gLinux: Google wechselt von Ubuntu auf Debian

Zur Kategorie wechselnUnix Server vom | Quelle: google.com Direktlink direkt öffnen

Während die Server von Google praktisch alle mit Linux laufen, zeichnet sich bei Desktop- und Laptop-Systemen ein weniger eindeutiges Bild. Die bei dem Softwarehersteller beschäftigten Entwickler verwenden nämlich eine Reihe unterschiedlicher Betriebssysteme, so kommen etwa viele Macbooks ...
News Bewertung

Weiterlesen Weiterlesen

CentOS Seven blog: Meltdown and Spectre: The response from CentOS

Zur Kategorie wechselnUnix Server vom | Quelle: seven.centos.org Direktlink direkt öffnen

As you are no doubt well aware, the Meltdown and Spectre bugs are hardware flaws in Intel and AMD chips, and have been all over the tech news for the last few weeks. If you need to get up to speed on what they’re all about, we recommend this great blog post.

CentOS, meanwhile, has not been idle, and has rolled out new kernels for CentOS 6 and CentOS 7 in response, both of which were announced on January 4th. ISO images were made available on January 8th.

Docker containers were made available on January 9th.

EC2 cloud images typically take a few extra days, and will be announced on the centos-announce mailing list.

On January 17th, Johnny Hughes announced an update to the microcode.dat on CentOS 6. You can read more about that in his tweet, and in this mailing list message.

For more information, and further updated, watch the centos-announce mailing list, and our various social media outlets:

 


News Bewertung

Weiterlesen Weiterlesen

DSA-4091 mysql-5.5 - security update

Zur Kategorie wechselnUnix Server vom | Quelle: debian.org Direktlink direkt öffnen

Several issues have been discovered in the MySQL database server. The vulnerabilities are addressed by upgrading MySQL to the new upstream version 5.5.59, which includes additional changes. Please see the MySQL 5.5 Release Notes and Oracle's Critical Patch Update advisory for further details:


News Bewertung

Weiterlesen Weiterlesen

USN-3536-1: GNU C Library vulnerability

Zur Kategorie wechselnUnix Server vom | Quelle: ubuntu.com Direktlink direkt öffnen

Ubuntu Security Notice USN-3536-1

17th January, 2018

eglibc vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 12.04 LTS

Summary

The GNU C library could be made to run programs as an administrator.

Software description

  • eglibc - GNU C Library

Details

It was discovered that the GNU C library did not properly handle all of
the possible return values from the kernel getcwd(2) syscall. A local
attacker could potentially exploit this to execute arbitrary code in setuid
programs and gain administrative privileges. (CVE-2018-1000001)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 12.04 LTS:
libc6 2.15-0ubuntu10.21

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

CVE-2018-1000001


News Bewertung

Weiterlesen Weiterlesen

USN-3535-1: Bind vulnerability

Zur Kategorie wechselnUnix Server vom | Quelle: ubuntu.com Direktlink direkt öffnen

Ubuntu Security Notice USN-3535-1

17th January, 2018

bind9 vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Bind could be made to crash if it received specially crafted network traffic.

Software description

  • bind9 - Internet Domain Name Server

Details

Jayachandran Palanisamy discovered that the Bind resolver incorrectly
handled fetch cleanup sequencing. A remote attacker could possibly use this
issue to cause Bind to crash, resulting in a denial of service.

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 17.10:
bind9 1:9.10.3.dfsg.P4-12.6ubuntu1.1
Ubuntu 16.04 LTS:
bind9 1:9.10.3.dfsg.P4-8ubuntu1.10
Ubuntu 14.04 LTS:
bind9 1:9.9.5.dfsg-3ubuntu0.17

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2017-3145


News Bewertung

Weiterlesen Weiterlesen

USN-3535-2: Bind vulnerability

Zur Kategorie wechselnUnix Server vom | Quelle: ubuntu.com Direktlink direkt öffnen

Ubuntu Security Notice USN-3535-2

17th January, 2018

bind9 vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 12.04 LTS

Summary

Bind could be made to crash if it received specially crafted network traffic.

Software description

  • bind9 - Internet Domain Name Server

Details

USN-3535-1 fixed a vulnerability in Bind. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

Jayachandran Palanisamy discovered that the Bind resolver incorrectly
handled fetch cleanup sequencing. A remote attacker could possibly use this
issue to cause Bind to crash, resulting in a denial of service.

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 12.04 LTS:
bind9 1:9.8.1.dfsg.P1-4ubuntu0.24

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2017-3145


News Bewertung

Weiterlesen Weiterlesen

USN-3534-1: GNU C Library vulnerabilities

Zur Kategorie wechselnUnix Server vom | Quelle: ubuntu.com Direktlink direkt öffnen

Ubuntu Security Notice USN-3534-1

17th January, 2018

eglibc, glibc vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in the GNU C library.

Software description

  • eglibc - GNU C Library
  • glibc - GNU C Library

Details

It was discovered that the GNU C library did not properly handle all of
the possible return values from the kernel getcwd(2) syscall. A local
attacker could potentially exploit this to execute arbitrary code in setuid
programs and gain administrative privileges. (CVE-2018-1000001)

A memory leak was discovered in the _dl_init_paths() function in the GNU
C library dynamic loader. A local attacker could potentially exploit this
with a specially crafted value in the LD_HWCAP_MASK environment variable,
in combination with CVE-2017-1000409 and another vulnerability on a system
with hardlink protections disabled, in order to gain administrative
privileges. (CVE-2017-1000408)

A heap-based buffer overflow was discovered in the _dl_init_paths()
function in the GNU C library dynamic loader. A local attacker could
potentially exploit this with a specially crafted value in the
LD_LIBRARY_PATH environment variable, in combination with CVE-2017-1000408
and another vulnerability on a system with hardlink protections disabled,
in order to gain administrative privileges. (CVE-2017-1000409)

An off-by-one error leading to a heap-based buffer overflow was discovered
in the GNU C library glob() implementation. An attacker could potentially
exploit this to cause a denial of service or execute arbitrary code via a
maliciously crafted pattern. (CVE-2017-15670)

A heap-based buffer overflow was discovered during unescaping of user names
with the ~ operator in the GNU C library glob() implementation. An attacker
could potentially exploit this to cause a denial of service or execute
arbitrary code via a maliciously crafted pattern. (CVE-2017-15804)

It was discovered that the GNU C library dynamic loader mishandles RPATH
and RUNPATH containing $ORIGIN for privileged (setuid or AT_SECURE)
programs. A local attacker could potentially exploit this by providing a
specially crafted library in the current working directory in order to
gain administrative privileges. (CVE-2017-16997)

It was discovered that the GNU C library malloc() implementation could
return a memory block that is too small if an attempt is made to allocate
an object whose size is close to SIZE_MAX, resulting in a heap-based
overflow. An attacker could potentially exploit this to cause a denial of
service or execute arbitrary code. This issue only affected Ubuntu 17.10.
(CVE-2017-17426)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 17.10:
libc6 2.26-0ubuntu2.1
Ubuntu 16.04 LTS:
libc6 2.23-0ubuntu10
Ubuntu 14.04 LTS:
libc6 2.19-0ubuntu6.14

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

CVE-2017-1000408, CVE-2017-1000409, CVE-2017-15670, CVE-2017-15804, CVE-2017-16997, CVE-2017-17426, CVE-2018-1000001


News Bewertung

Weiterlesen Weiterlesen

DSA-4090 wordpress - security update

Zur Kategorie wechselnUnix Server vom | Quelle: debian.org Direktlink direkt öffnen

Several vulnerabilities were discovered in Wordpress, a web blogging tool. They allowed remote attackers to perform SQL injections and various Cross-Side Scripting (XSS) and Server-Side Request Forgery (SSRF) attacks, as well as bypass some access restrictions.


News Bewertung

Weiterlesen Weiterlesen

USN-3533-1: Transmission vulnerability

Zur Kategorie wechselnUnix Server vom | Quelle: ubuntu.com Direktlink direkt öffnen

Ubuntu Security Notice USN-3533-1

16th January, 2018

transmission vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Transmission could be made to run arbitraty code.

Software description

  • transmission - lightweight BitTorrent client

Details

It was discovered that Transmission incorrectly handled certain POST requests to
the RPC server and allowed DNS rebinding attack. An attacker could possibly use this
issue to execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 17.10:
transmission 2.92-2ubuntu3.1
Ubuntu 16.04 LTS:
transmission 2.84-3ubuntu3.1
Ubuntu 14.04 LTS:
transmission 2.82-1.1ubuntu3.2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2018-5702


News Bewertung

Weiterlesen Weiterlesen

DSA-4089 bind9 - security update

Zur Kategorie wechselnUnix Server vom | Quelle: debian.org Direktlink direkt öffnen

Jayachandran Palanisamy of Cygate AB reported that BIND, a DNS server implementation, was improperly sequencing cleanup operations, leading in some cases to a use-after-free error, triggering an assertion failure and crash in named.


News Bewertung

Weiterlesen Weiterlesen

USN-3532-1: GDK-PixBuf vulnerabilities

Zur Kategorie wechselnUnix Server vom | Quelle: ubuntu.com Direktlink direkt öffnen

Ubuntu Security Notice USN-3532-1

15th January, 2018

gdk-pixbuf vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in GDK-PixBuf.

Software description

  • gdk-pixbuf - GDK Pixbuf library

Details

It was discoreved that GDK-PixBuf incorrectly handled certain gif images.
An attacker could use this to execute arbitrary code. This issue only affected
Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2017-1000422)

Ariel Zelivansky discovered that GDK-PixBuf incorrectly handled certain images.
An attacker could use this to cause a denial of service.
(CVE-2017-6312, CVE-2017-6313)

Ariel Zelivansky discovered that GDK-PixBuf incorrectly handled large TIFF files.
An attacker could use this to cause a denial of service. (CVE-2017-6314)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 17.10:
libgdk-pixbuf2.0-0 2.36.11-1ubuntu0.1
Ubuntu 16.04 LTS:
libgdk-pixbuf2.0-0 2.32.2-1ubuntu1.4
Ubuntu 14.04 LTS:
libgdk-pixbuf2.0-0 2.30.7-0ubuntu1.8

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart your session to make
all the necessary changes.

References

CVE-2017-1000422, CVE-2017-6312, CVE-2017-6313, CVE-2017-6314


News Bewertung

Weiterlesen Weiterlesen

CentOS Seven blog: PHP 7.2 for CentOS 7 armhfp

Zur Kategorie wechselnUnix Server vom | Quelle: seven.centos.org Direktlink direkt öffnen

What happens when you need something that is not readily available, but you can help get it done?
In my case, start harrassing people until you get all the info you need. Enter @arrfab and @remicollet.
Fabian got the builder ready, and contacted Remi who got me to use his SRPMS, all I had to do was push the packages to the builders and wait, and wait, and wait some more....

Status:
The current status is that we have php-7.2.1 working, as you can see in the screenshot, with only basic tests done for the moment, but all successful.
Most of the packages are built, some are being a little stubborn, but we'll get it done. But here is where you come in, we need testing (heavy testing), real user case scenarios.
If you want to see a Spectre of what things are going to be, and you are not afraid your computer may have a complete Meltdown, you can keep reading.

Installing:
Currently we are focused on building only the opt-in php replacement, and all the other platform dependant packages from Remi's repo (noarch rpms are not currently the main target, so you should get it from Remi's repo).
If you don't already have a "test subject", please follow the steps on https://wiki.centos.org/SpecialInterestGroup/AltArch/Arm32 first, including  EPEL, which is done with the following command:

cat > /etc/yum.repos.d/epel.repo << EOF
[epel]
name=Epel rebuild for armhfp
baseurl=https://armv7.dev.centos.org/repodir/epel-pass-1/
enabled=1
gpgcheck=0
EOF

Then all that is left is adding the test repo like this:

cat > /etc/yum.repos.d/php72-testing.repo << EOF
[php72-testing]
name=Remi php72 rebuild for armhfp
baseurl=https://armv7.dev.centos.org/repodir/community-php72-testing/
enabled=1
gpgcheck=0
EOF

As I said before,  we aren't rebuilding noarch packages, so if you need one of those, just add remi's repo like this:

cat > /etc/yum.repos.d/remi.repo << EOF
[remi]
name=Remi's RPM repository for Enterprise Linux 7 - $basearch
mirrorlist=http://cdn.remirepo.net/enterprise/7/remi/mirror
enabled=1
gpgcheck=1
gpgkey=https://rpms.remirepo.net/RPM-GPG-KEY-remi
EOF

Feedback:
Come find us on the CentOS on ARM-Dev list at https://lists.centos.org/mailman/listinfo/arm-dev

Thanks for testing!!!
Pablo.


News Bewertung

Weiterlesen Weiterlesen

DSA-4088 gdk-pixbuf - security update

Zur Kategorie wechselnUnix Server vom | Quelle: debian.org Direktlink direkt öffnen

It was discovered that multiple integer overflows in the GIF image loader in the GDK Pixbuf library may result in denial of service and potentially the execution of arbitrary code if a malformed image file is opened.


News Bewertung

Weiterlesen Weiterlesen

DSA-4087 transmission - security update

Zur Kategorie wechselnUnix Server vom | Quelle: debian.org Direktlink direkt öffnen

Tavis Ormandy discovered a vulnerability in the Transmission BitTorrent client; insecure RPC handling between the Transmission daemon and the client interface(s) may result in the execution of arbitrary code if a user visits a malicious website while Transmission is running.


News Bewertung

Weiterlesen Weiterlesen

DSA-4086 libxml2 - security update

Zur Kategorie wechselnUnix Server vom | Quelle: debian.org Direktlink direkt öffnen

Nick Wellnhofer discovered that certain function calls inside XPath predicates can lead to use-after-free and double-free errors when executed by libxml2's XPath engine via an XSLT transformation.


News Bewertung

Weiterlesen Weiterlesen

DSA-4085 xmltooling - security update

Zur Kategorie wechselnUnix Server vom | Quelle: debian.org Direktlink direkt öffnen

Philip Huppert discovered the Shibboleth service provider is vulnerable to impersonation attacks and information disclosure due to mishandling of DTDs in the XMLTooling XML parsing library. For additional details please refer to the upstream advisory at https://shibboleth.net/community/advisories/secadv_20180112.txt


News Bewertung

Weiterlesen Weiterlesen

DSA-4084 gifsicle - security update

Zur Kategorie wechselnUnix Server vom | Quelle: debian.org Direktlink direkt öffnen

It was discovered that gifsicle, a tool for manipulating GIF image files, contained a flaw that could lead to arbitrary code execution.


News Bewertung

Weiterlesen Weiterlesen

USN-3531-1: Intel Microcode update

Zur Kategorie wechselnUnix Server vom | Quelle: ubuntu.com Direktlink direkt öffnen

Ubuntu Security Notice USN-3531-1

11th January, 2018

intel-microcode update

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 17.04
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

The system could be made to expose sensitive information.

Software description

  • intel-microcode - Processor microcode for Intel CPUs

Details

It was discovered that microprocessors utilizing speculative execution
and branch prediction may allow unauthorized memory reads via sidechannel
attacks. This flaw is known as Spectre. A local attacker could use this to
expose sensitive information, including kernel memory. (CVE-2017-5715)

This update provides the microcode updates required for the corresponding
Linux kernel updates.

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 17.10:
intel-microcode 3.20180108.0~ubuntu17.10.1
Ubuntu 17.04:
intel-microcode 3.20180108.0~ubuntu17.04.1
Ubuntu 16.04 LTS:
intel-microcode 3.20180108.0~ubuntu16.04.2
Ubuntu 14.04 LTS:
intel-microcode 3.20180108.0~ubuntu14.04.2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

CVE-2017-5715


News Bewertung

Weiterlesen Weiterlesen

USN-3530-1: WebKitGTK+ vulnerabilities

Zur Kategorie wechselnUnix Server vom | Quelle: ubuntu.com Direktlink direkt öffnen

Ubuntu Security Notice USN-3530-1

11th January, 2018

webkit2gtk vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 17.04
  • Ubuntu 16.04 LTS

Summary

WebKitGTK+ could be made to expose sensitive information.

Software description

  • webkit2gtk - Web content engine library for GTK+

Details

It was discovered that speculative execution performed by modern CPUs
could leak information through a timing side-channel attack, and that
this could be exploited in web browser JavaScript engines. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit this to obtain sensitive information from other
domains, bypassing same-origin restrictions. (CVE-2017-5753, CVE-2017-5715)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 17.10:
libwebkit2gtk-4.0-37 2.18.5-0ubuntu0.17.10.1
libjavascriptcoregtk-4.0-18 2.18.5-0ubuntu0.17.10.1
Ubuntu 17.04:
libwebkit2gtk-4.0-37 2.18.5-0ubuntu0.17.04.1
libjavascriptcoregtk-4.0-18 2.18.5-0ubuntu0.17.04.1
Ubuntu 16.04 LTS:
libwebkit2gtk-4.0-37 2.18.5-0ubuntu0.16.04.1
libjavascriptcoregtk-4.0-18 2.18.5-0ubuntu0.16.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any applications
that use WebKitGTK+, such as Epiphany, to make all the necessary changes.

References

CVE-2017-5715, CVE-2017-5753


News Bewertung

Weiterlesen Weiterlesen

DSA-4083 poco - security update

Zur Kategorie wechselnUnix Server vom | Quelle: debian.org Direktlink direkt öffnen

Stephan Zeisberg discovered that poco, a collection of open source C++ class libraries, did not correctly validate file paths in ZIP archives. An attacker could leverage this flaw to create or overwrite arbitrary files.


News Bewertung

Weiterlesen Weiterlesen

USN-3522-4: Linux kernel (Xenial HWE) regression

Zur Kategorie wechselnUnix Server vom | Quelle: ubuntu.com Direktlink direkt öffnen

Ubuntu Security Notice USN-3522-4

10th January, 2018

linux-lts-xenial regression

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 LTS

Summary

USN-3522-2 introduced a regression in the Linux Hardware Enablement kernel.

Software description

  • linux-lts-xenial - Linux hardware enablement kernel from Xenial for Trusty

Details

USN-3522-2 fixed a vulnerability in the Linux Hardware Enablement
kernel for Ubuntu 14.04 LTS to address Meltdown (CVE-2017-5754).
Unfortunately, that update introduced a regression where a few systems
failed to boot successfully. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

Jann Horn discovered that microprocessors utilizing speculative execution
and indirect branch prediction may allow unauthorized memory reads via
sidechannel attacks. This flaw is known as Meltdown. A local attacker could
use this to expose sensitive information, including kernel memory.

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 14.04 LTS:
linux-image-generic-lts-xenial 4.4.0.109.92
linux-image-lowlatency-lts-xenial 4.4.0.109.92
linux-image-4.4.0-109-lowlatency 4.4.0-109.132~14.04.1
linux-image-4.4.0-109-generic 4.4.0-109.132~14.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References

LP: 1741934, https://usn.ubuntu.com/usn/usn-3522-2


News Bewertung

Weiterlesen Weiterlesen

USN-3522-3: Linux kernel regression

Zur Kategorie wechselnUnix Server vom | Quelle: ubuntu.com Direktlink direkt öffnen

Ubuntu Security Notice USN-3522-3

10th January, 2018

linux regression

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 16.04 LTS

Summary

USN-3522-1 introduced a regression in the Linux kernel.

Software description

  • linux - Linux kernel

Details

USN-3522-1 fixed a vulnerability in the Linux kernel to address
Meltdown (CVE-2017-5754). Unfortunately, that update introduced
a regression where a few systems failed to boot successfully. This
update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

Jann Horn discovered that microprocessors utilizing speculative execution
and indirect branch prediction may allow unauthorized memory reads via
sidechannel attacks. This flaw is known as Meltdown. A local attacker could
use this to expose sensitive information, including kernel memory.

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 16.04 LTS:
linux-image-generic 4.4.0.109.114
linux-image-4.4.0-109-lowlatency 4.4.0-109.132
linux-image-lowlatency 4.4.0.109.114
linux-image-4.4.0-109-generic 4.4.0-109.132

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References

LP: 1741934


News Bewertung

Weiterlesen Weiterlesen

USN-3528-1: Ruby vulnerabilities

Zur Kategorie wechselnUnix Server vom | Quelle: ubuntu.com Direktlink direkt öffnen

Ubuntu Security Notice USN-3528-1

10th January, 2018

ruby1.9.1, ruby2.3 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in Ruby.

Software description

  • ruby1.9.1 - Interpreter of object-oriented scripting language Ruby
  • ruby2.3 - Interpreter of object-oriented scripting language Ruby

Details

It was discovered that Ruby incorrectly handled certain terminal emulator
escape sequences. An attacker could use this to execute arbitrary code via
a crafted user name. This issue only affected Ubuntu 16.04 LTS and Ubuntu 17.10.
(CVE-2017-10784)

It was discovered that Ruby incorrectly handled certain strings.
An attacker could use this to cause a denial of service. This issue
only affected Ubuntu 16.04 LTS and Ubuntu 17.10. (CVE-2017-14033)

It was discovered that Ruby incorrectly handled some generating JSON.
An attacker could use this to possible expose sensitive information.
This issue only affected Ubuntu 16.04 LTS and Ubuntu 17.10.
(CVE-2017-14064)

It was discovered that Ruby incorrectly handled certain inputs.
An attacker could use this to execute arbitrary code.
(CVE-2017-17790)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 17.10:
libruby2.3 2.3.3-1ubuntu1.2
ruby2.3 2.3.3-1ubuntu1.2
Ubuntu 16.04 LTS:
libruby2.3 2.3.1-2~16.04.5
ruby2.3 2.3.1-2~16.04.5
Ubuntu 14.04 LTS:
ruby1.9.1 1.9.3.484-2ubuntu1.7
ruby1.9.3 1.9.3.484-2ubuntu1.7
libruby1.9.1 1.9.3.484-2ubuntu1.7

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2017-10784, CVE-2017-14033, CVE-2017-14064, CVE-2017-17790


News Bewertung

Weiterlesen Weiterlesen

USN-3523-2: Linux kernel (HWE) vulnerabilities

Zur Kategorie wechselnUnix Server vom | Quelle: ubuntu.com Direktlink direkt öffnen

Ubuntu Security Notice USN-3523-2

10th January, 2018

linux-hwe, linux-azure, linux-gcp, linux-oem vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 16.04 LTS

Summary

Several security issues were fixed in the Linux kernel.

Software description

  • linux-azure - Linux kernel for Microsoft Azure Cloud systems
  • linux-gcp - Linux kernel for Google Cloud Platform (GCP) systems
  • linux-hwe - Linux hardware enablement (HWE) kernel
  • linux-oem - Linux kernel for OEM processors

Details

USN-3523-1 fixed vulnerabilities in the Linux kernel for Ubuntu 17.10.
This update provides the corresponding updates for the Linux
Hardware Enablement (HWE) kernel from Ubuntu 17.10 for Ubuntu
16.04 LTS.

Jann Horn discovered that microprocessors utilizing speculative execution
and indirect branch prediction may allow unauthorized memory reads via
sidechannel attacks. This flaw is known as Meltdown. A local attacker could
use this to expose sensitive information, including kernel memory.
(CVE-2017-5754)

Jann Horn discovered that the Berkeley Packet Filter (BPF) implementation
in the Linux kernel did not properly check the relationship between pointer
values and the BPF stack. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2017-17863)

Jann Horn discovered that the Berkeley Packet Filter (BPF) implementation
in the Linux kernel improperly performed sign extension in some situations.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2017-16995)

Alexei Starovoitov discovered that the Berkeley Packet Filter (BPF)
implementation in the Linux kernel contained a branch-pruning logic issue
around unreachable code. A local attacker could use this to cause a denial
of service. (CVE-2017-17862)

Jann Horn discovered that the Berkeley Packet Filter (BPF) implementation
in the Linux kernel mishandled pointer data values in some situations. A
local attacker could use this to to expose sensitive information (kernel
memory). (CVE-2017-17864)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 16.04 LTS:
linux-image-4.13.0-1015-oem 4.13.0-1015.16
linux-image-gke 4.13.0.1006.8
linux-image-4.13.0-26-generic 4.13.0-26.29~16.04.2
linux-image-4.13.0-26-generic-lpae 4.13.0-26.29~16.04.2
linux-image-gcp 4.13.0.1006.8
linux-image-generic-hwe-16.04 4.13.0.26.46
linux-image-oem 4.13.0.1015.18
linux-image-4.13.0-26-lowlatency 4.13.0-26.29~16.04.2
linux-image-lowlatency-hwe-16.04 4.13.0.26.46
linux-image-4.13.0-1005-azure 4.13.0-1005.7
linux-image-azure 4.13.0.1005.6
linux-image-generic-lpae-hwe-16.04 4.13.0.26.46
linux-image-4.13.0-1006-gcp 4.13.0-1006.9

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References

CVE-2017-16995, CVE-2017-17862, CVE-2017-17863, CVE-2017-17864, CVE-2017-5754


News Bewertung

Weiterlesen Weiterlesen

USN-3523-3: Linux kernel (Raspberry Pi 2) vulnerabilities

Zur Kategorie wechselnUnix Server vom | Quelle: ubuntu.com Direktlink direkt öffnen

Ubuntu Security Notice USN-3523-3

10th January, 2018

linux-raspi2 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10

Summary

Several security issues were fixed in the Linux kernel.

Software description

  • linux-raspi2 - Linux kernel for Raspberry Pi 2

Details

Jann Horn discovered that the Berkeley Packet Filter (BPF) implementation
in the Linux kernel did not properly check the relationship between pointer
values and the BPF stack. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2017-17863)

Jann Horn discovered that the Berkeley Packet Filter (BPF) implementation
in the Linux kernel improperly performed sign extension in some situations.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2017-16995)

Alexei Starovoitov discovered that the Berkeley Packet Filter (BPF)
implementation in the Linux kernel contained a branch-pruning logic issue
around unreachable code. A local attacker could use this to cause a denial
of service. (CVE-2017-17862)

Jann Horn discovered that the Berkeley Packet Filter (BPF) implementation
in the Linux kernel mishandled pointer data values in some situations. A
local attacker could use this to to expose sensitive information (kernel
memory). (CVE-2017-17864)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 17.10:
linux-image-4.13.0-1011-raspi2 4.13.0-1011.11
linux-image-raspi2 4.13.0.1011.9

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References

CVE-2017-16995, CVE-2017-17862, CVE-2017-17863, CVE-2017-17864


News Bewertung

Weiterlesen Weiterlesen

Seitennavigation

Seite 92 von 144 Seiten (Bei Beitrag 3185 - 3220)
5.010x Beiträge in dieser Kategorie

Auf Seite 91 zurück | Nächste 93 Seite | Letzte Seite

[ 87 ] [ 88 ] [ 89 ] [ 90 ] [ 91 ] [92] [ 93 ] [ 94 ] [ 95 ] [ 96 ] [ 97 ] [ 98 ] [ 99 ] [ 100 ] [ 101 ] [ 102 ]