Mehrere Probleme in Linux
ID: | USN-1453-1 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 10.04 LTS |
Datum: | Sa, 26. Mai 2012, 07:23 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4086
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1601 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2123 |
Applikationen: | Linux |
Originalnachricht |
|
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --===============1069897016407975207== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig8E9E5A9DE97D441565505EFC" This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig8E9E5A9DE97D441565505EFC Content-Type: multipart/mixed; boundary="------------060103040401020401050308" This is a multi-part message in MIME format. --------------060103040401020401050308 Content-Type: text/plain; charset=ISO-8859- Content-Transfer-Encoding: quoted-printable ========================================================================== Ubuntu Security Notice USN-1453-1 May 25, 2012 linux-ec2 vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 10.04 LTS Summary: Several security issues were fixed in the kernel. Software Description: - linux-ec2: Linux kernel for EC2 Details: A flaw was found in the Linux's kernels ext4 file system when mounted with a journal. A local, unprivileged user could exploit this flaw to cause a denial of service. (CVE-2011-4086) A flaw was found in the Linux kernel's KVM (Kernel Virtual Machine) virtual cpu setup. An unprivileged local user could exploit this flaw to crash the system leading to a denial of service. (CVE-2012-1601) Steve Grubb reported a flaw with Linux fscaps (file system base capabilities) when used to increase the permissions of a process. For application on which fscaps are in use a local attacker can disable address space randomization to make attacking the process with raised privileges easier. (CVE-2012-2123) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 10.04 LTS: linux-image-2.6.32-345-ec2 2.6.32-345.48 After a standard system update you need to reboot your computer to make all the necessary changes. References: http://www.ubuntu.com/usn/usn-1453-1 CVE-2011-4086, CVE-2012-1601, CVE-2012-2123 Package Information: https://launchpad.net/ubuntu/+source/linux-ec2/2.6.32-345.48 --------------060103040401020401050308 Content-Type: text/plain; charset=UTF-8; name="Attached Message Part" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="Attached Message Part" --------------060103040401020401050308-- --------------enig8E9E5A9DE97D441565505EFC Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBCgAGBQJPv9+UAAoJEAUvNnAY1cPY+MAP/2vnG86iWgtkatoFJbqj0iD6 neAFyPHqYfxMIZfWGTzsPY98wPz73qZh4PjVn9RmOwn+gupxyVhN0UjZJbuRrIms JYqtl3SJUGm0pi16uuomMR3PDRNaZozLVS97/tF7j2cNi/tPqeIkGO7pKvzOPKzF 0zMOGnqHXdk1RgeO7u8eid8sB4PHoTrFONyYbbN9tNe8hPGA/Ur66CWnGTr3R+uX hAUDfwNRbSNV21f5mf0YkY4g7kPR8S79i7/gjGPb9h4T8IGSp9vPLrQmf/nPfPU/ yAbZFuYIdV5Vvv3q8TND+D4qjcfhZXE7fx47GUYopCXLUt7o49WB9Iay6DklVQpF 4g40NK12ueA+27Qt+XRt/PTvvNUXRb+jjVrn09ZO9lAO0Nw9mRaFBG7cHxRNc/53 yO7FhrgLfpTJMzuzxxUVKhfWiMKo0HxLVD6e9hoe1xj1xRCzCwkWg3hhX8bsrnC4 RDaxMoafqraF6rZ9rH4lhWPPA8b+IpXW4kP7KJNhxJdOej7X1QOR1sFZO1gnUi+3 cfVWDH3aaPrBe5VXDK0MqIOSl4NeBH7g/i+jQKifU7gddPlRKlbiIGW+SBITM6ak QIH0ONHbZpoMB0/tEDzxiknq7+3smLcy6QOdQ2NkvtjmLefYLYUVjCJby8t8qL1Q KFrQN++5l1rrjOFvIjJo =xzE5 -----END PGP SIGNATURE----- --------------enig8E9E5A9DE97D441565505EFC-- --===============1069897016407975207== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce --===============1069897016407975207==-- |