drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Linux
Name: |
Mehrere Probleme in Linux |
|
ID: |
USN-1300-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 10.04 LTS |
|
Datum: |
Di, 13. Dezember 2011, 16:30 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4077
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4132
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4330 |
|
Applikationen: |
Linux |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --===============2948134704947457298== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig9C8BC52933F416198D460C58"
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig9C8BC52933F416198D460C58 Content-Type: text/plain; charset=ISO-8859- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-1300-1 December 13, 2011
linux-fsl-imx51 vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description: - linux-fsl-imx51: Linux kernel for IMX51
Details:
A bug was discovered in the XFS filesystem's handling of pathnames. A local attacker could exploit this to crash the system, leading to a denial of service, or gain root privileges. (CVE-2011-4077)
A flaw was found in the Journaling Block Device (JBD). A local attacker able to mount ext3 or ext4 file systems could exploit this to crash the system, leading to a denial of service. (CVE-2011-4132)
Clement Lecigne discovered a bug in the HFS file system bounds checking. When a malformed HFS file system is mounted a local user could crash the system or gain root privileges. (CVE-2011-4330)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 10.04 LTS: linux-image-2.6.31-612-imx51 2.6.31-612.31
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. If you use linux-restricted-modules, you have to update that package as well to get modules which work with the new kernel version. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-server, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: http://www.ubuntu.com/usn/usn-1300-1 CVE-2011-4077, CVE-2011-4132, CVE-2011-4330
Package Information: https://launchpad.net/ubuntu/+source/linux-fsl-imx51/2.6.31-612.31
--------------enig9C8BC52933F416198D460C58 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iQIcBAEBCgAGBQJO50ijAAoJEAUvNnAY1cPYDkAP/2sGnJ/EqO8NME4g9vyYr9wG yZ56rgjMi8mQOMgmTZOzoTM8ANpRCHQ4rBvyFFIuwezx5rOZoYELtaNkPd/LT47C G8gOWMZAb824qmylf6KKyxIauKRksr0MEF6T3L1wtVJysJnnDxTUe1aS9aK3+IbR +fYBwSd4GV1hIhj5I+YK6VyYqka2Xv8jFPY5RHt+XF4+yqmVK1Trkq1V4i97Xxqi s08hjV5Opmxm1o8EvMWPdxlcpBOdZr4X/PoLH/DKOXq65g2Nb4sF2eWvBxR4Ktfp DrPB4YBN9KsMw77zuFzOTowa4/IPoqrn+ee4RWhqw0j3GwjDDxiiKzHtLnG2D6Pe 4zmSssBtFP3UjDh0MWIH2Qy+WRIG4jpAU1lGAYT5JsgGFouISm2spE9NfTXf8dSZ 5BLNXkU3IMG4pLKG8HWEY3X7M1H34MrJ6l8av7WPOQpSpZXpftMlrTN1kR7623BE ixQsRwjOF0fYtULXI59V+j029bGJFN1p0R4iof9DxXvNeDZIkyZykcSYqLCE+UQ9 P1RZFv4kLMO5d84nlyJt0t6UzEEIvazuwLo6k4tdrL+rhj186AdfO9Qpec3o6aOG xjIMbOxVo4MeXdjwU+RIEO0NR8fsK8XBeNGF+0LWYCx4mndisYfJHKNCIquEeFdq 6249mzVX5NJYzTitVfGv =ikXd -----END PGP SIGNATURE-----
--------------enig9C8BC52933F416198D460C58--
--===============2948134704947457298== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============2948134704947457298==--
|
|
|
|