Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: USN-1787-1
Distribution: Ubuntu
Plattformen: Ubuntu 11.10
Datum: Di, 2. April 2013, 22:55
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0914
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1767
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1792
Applikationen: Linux

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--===============5761432870835311811==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="------------enig9CACBBC7A6FFFC6AF0C4488D"

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig9CACBBC7A6FFFC6AF0C4488D
Content-Type: multipart/mixed;
boundary="------------020905040104070506090406"

This is a multi-part message in MIME format.
--------------020905040104070506090406
Content-Type: text/plain; charset=ISO-8859-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-1787-1
April 02, 2013

linux vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 11.10

Summary:

Several security issues were fixed in the kernel.

Software Description:
- linux: Linux kernel

Details:

Emese Revfy discovered that in the Linux kernel signal handlers could leak
address information across an exec, making it possible to bypass ASLR
(Address Space Layout Randomization). A local user could use this flaw to
by pass ASLR to reliably deliver an exploit payload that would otherwise be
stopped (by ASLR). (CVE-2013-0914)

A memoery use after free error was discover in the Linux kernel's tmpfs
filesystem. A local user could exploit this flaw to gain privileges or
cause a denial of service (system crash). (CVE-2013-1767)

Mateusz Guzik discovered a race in the Linux kernel's keyring. A local user
could exploit this flaw to cause a denial of service (system crash).
(CVE-2013-1792)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 11.10:
linux-image-3.0.0-32-generic 3.0.0-32.51
linux-image-3.0.0-32-generic-pae 3.0.0-32.51
linux-image-3.0.0-32-omap 3.0.0-32.51
linux-image-3.0.0-32-powerpc 3.0.0-32.51
linux-image-3.0.0-32-powerpc-smp 3.0.0-32.51
linux-image-3.0.0-32-powerpc64-smp 3.0.0-32.51
linux-image-3.0.0-32-server 3.0.0-32.51
linux-image-3.0.0-32-virtual 3.0.0-32.51

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1787-1
CVE-2013-0914, CVE-2013-1767, CVE-2013-1792

Package Information:
https://launchpad.net/ubuntu/+source/linux/3.0.0-32.51


--------------020905040104070506090406
Content-Type: text/plain; charset=UTF-8;
name="Attached Message Part"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
filename="Attached Message Part"


--------------020905040104070506090406--

--------------enig9CACBBC7A6FFFC6AF0C4488D
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/
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=lpj+
-----END PGP SIGNATURE-----

--------------enig9CACBBC7A6FFFC6AF0C4488D--


--===============5761432870835311811==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============5761432870835311811==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung