Login


 
Newsletter
Werbung
Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: USN-1453-1
Distribution: Ubuntu
Plattformen: Ubuntu 10.04 LTS
Datum: Sa, 26. Mai 2012, 07:23
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4086
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1601
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2123

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--===============1069897016407975207==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="------------enig8E9E5A9DE97D441565505EFC"

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig8E9E5A9DE97D441565505EFC
Content-Type: multipart/mixed;
boundary="------------060103040401020401050308"

This is a multi-part message in MIME format.
--------------060103040401020401050308
Content-Type: text/plain; charset=ISO-8859-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-1453-1
May 25, 2012

linux-ec2 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 10.04 LTS

Summary:

Several security issues were fixed in the kernel.

Software Description:
- linux-ec2: Linux kernel for EC2

Details:

A flaw was found in the Linux's kernels ext4 file system when mounted with
a journal. A local, unprivileged user could exploit this flaw to cause a
denial of service. (CVE-2011-4086)

A flaw was found in the Linux kernel's KVM (Kernel Virtual Machine) virtual
cpu setup. An unprivileged local user could exploit this flaw to crash the
system leading to a denial of service. (CVE-2012-1601)

Steve Grubb reported a flaw with Linux fscaps (file system base
capabilities) when used to increase the permissions of a process. For
application on which fscaps are in use a local attacker can disable address
space randomization to make attacking the process with raised privileges
easier. (CVE-2012-2123)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 10.04 LTS:
linux-image-2.6.32-345-ec2 2.6.32-345.48

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1453-1
CVE-2011-4086, CVE-2012-1601, CVE-2012-2123

Package Information:
https://launchpad.net/ubuntu/+source/linux-ec2/2.6.32-345.48


--------------060103040401020401050308
Content-Type: text/plain; charset=UTF-8;
name="Attached Message Part"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
filename="Attached Message Part"


--------------060103040401020401050308--

--------------enig8E9E5A9DE97D441565505EFC
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQIcBAEBCgAGBQJPv9+UAAoJEAUvNnAY1cPY+MAP/2vnG86iWgtkatoFJbqj0iD6
neAFyPHqYfxMIZfWGTzsPY98wPz73qZh4PjVn9RmOwn+gupxyVhN0UjZJbuRrIms
JYqtl3SJUGm0pi16uuomMR3PDRNaZozLVS97/tF7j2cNi/tPqeIkGO7pKvzOPKzF
0zMOGnqHXdk1RgeO7u8eid8sB4PHoTrFONyYbbN9tNe8hPGA/Ur66CWnGTr3R+uX
hAUDfwNRbSNV21f5mf0YkY4g7kPR8S79i7/gjGPb9h4T8IGSp9vPLrQmf/nPfPU/
yAbZFuYIdV5Vvv3q8TND+D4qjcfhZXE7fx47GUYopCXLUt7o49WB9Iay6DklVQpF
4g40NK12ueA+27Qt+XRt/PTvvNUXRb+jjVrn09ZO9lAO0Nw9mRaFBG7cHxRNc/53
yO7FhrgLfpTJMzuzxxUVKhfWiMKo0HxLVD6e9hoe1xj1xRCzCwkWg3hhX8bsrnC4
RDaxMoafqraF6rZ9rH4lhWPPA8b+IpXW4kP7KJNhxJdOej7X1QOR1sFZO1gnUi+3
cfVWDH3aaPrBe5VXDK0MqIOSl4NeBH7g/i+jQKifU7gddPlRKlbiIGW+SBITM6ak
QIH0ONHbZpoMB0/tEDzxiknq7+3smLcy6QOdQ2NkvtjmLefYLYUVjCJby8t8qL1Q
KFrQN++5l1rrjOFvIjJo
=xzE5
-----END PGP SIGNATURE-----

--------------enig8E9E5A9DE97D441565505EFC--


--===============1069897016407975207==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============1069897016407975207==--
Pro-Linux
Frohe Weihnachten Fest!
Neue Nachrichten
Werbung