--===============1731253972195970659== Content-Type: multipart/signed; micalg="pgp-sha512"; protocol="application/pgp-signature"; boundary="=-HYLceZwRBNeJ1N9MWqx+"
--=-HYLceZwRBNeJ1N9MWqx+ Content-Type: text/plain; charset="UTF-8 Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-1246-1 October 25, 2011
linux vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 11.04
Summary:
Several security issues were fixed in the kernel.
Software Description: - linux: Linux kernel
Details:
Dan Rosenberg discovered that the IPv4 diagnostic routines did not correctly validate certain requests. A local attacker could exploit this to consume CPU resources, leading to a denial of service. (CVE-2011-2213)
Dan Rosenberg discovered that the Bluetooth stack incorrectly handled certain L2CAP requests. If a system was using Bluetooth, a remote attacker could send specially crafted traffic to crash the system or gain root privileges. (CVE-2011-2497)
It was discovered that the EXT4 filesystem contained multiple off-by-one flaws. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2011-2695)
Mauro Carvalho Chehab discovered that the si4713 radio driver did not correctly check the length of memory copies. If this hardware was available, a local attacker could exploit this to crash the system or gain root privileges. (CVE-2011-2700)
Herbert Xu discovered that certain fields were incorrectly handled when Generic Receive Offload (CVE-2011-2723)
Time Warns discovered that long symlinks were incorrectly handled on Be filesystems. A local attacker could exploit this with a malformed Be filesystem and crash the system, leading to a denial of service. (CVE-2011-2928)
Dan Kaminsky discovered that the kernel incorrectly handled random sequence number generation. An attacker could use this flaw to possibly predict sequence numbers and inject packets. (CVE-2011-3188)
Darren Lavender discovered that the CIFS client incorrectly handled certain large values. A remote attacker with a malicious server could exploit this to crash the system or possibly execute arbitrary code as the root user. (CVE-2011-3191)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 11.04: linux-image-2.6.38-12-generic 2.6.38-12.51 linux-image-2.6.38-12-generic-pae 2.6.38-12.51 linux-image-2.6.38-12-omap 2.6.38-12.51 linux-image-2.6.38-12-powerpc 2.6.38-12.51 linux-image-2.6.38-12-powerpc-smp 2.6.38-12.51 linux-image-2.6.38-12-powerpc64-smp 2.6.38-12.51 linux-image-2.6.38-12-server 2.6.38-12.51 linux-image-2.6.38-12-versatile 2.6.38-12.51 linux-image-2.6.38-12-virtual 2.6.38-12.51
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. If you use linux-restricted-modules, you have to update that package as well to get modules which work with the new kernel version. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-server, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: http://www.ubuntu.com/usn/usn-1246-1 CVE-2011-2213, CVE-2011-2497, CVE-2011-2695, CVE-2011-2700, CVE-2011-2723, CVE-2011-2928, CVE-2011-3188, CVE-2011-3191
Package Information: https://launchpad.net/ubuntu/+source/linux/2.6.38-12.51
--ÑYLceZwRBNeJ1N9MWqx+ Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part Content-Transfer-Encoding: 7bit
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux)
iQIcBAABCgAGBQJOptAUAAoJEGVp2FWnRL6TcskP/1fFzKyuPtuOTXNp99Pp/Dnl 48WcE/E3Y6tb1qGCKDt1fdDni9IbBaQotC6exT9ZPWOWoO9j5fAt8C0Rk4JCMdLC sB+MDQQDSP5HdZ2KjzEBkwsnSrIsaA1yaqgLK57c8bLbnPNlzy6SP0TY4udIbxcG DkBGEOuTArdXpQjYhpHGfhwnZc2Wx8lWqjOAJBvU/g/7q48Rk0Z+ZQVc2cy4kdZd LpVTihcfvie7avT2AWAU41pQ1IT0z2X0hbQrxGWvDOPN2YdqKPIwYue/a1n7Sxww uwwbLYC2zozpOYayyZBINet+rSTmKW+g9gy1Jd+uiGmJmbPqhgwQBJBNvULNOwlw rEQfGbkDUd0mjQO7kkFHEDktYKENwuizSQB9/+AyGzMiwwsoM+5W9JIOHXzzi9wU 4VI6HCqO4PKp7xVzNedaKeLqm5DBSk4IoQ/LZdcK9Yem3gzoPqLVdhDWMjhiv/r0 FvIl0J/w6i/L+2/R/LN+NkVZbRaj0O512ysaQIlnya/3jopXXB4cnyYdYaYtB4fK LF8l3I38sZHroAa+KTuC4RszjNfTsUzKi6mbZ30Yhz/S6r5k4Mq+2YMmPBCmdKQf IrpFOdiQw8WBscXdg1taT5ieTaAHqD+2k3VLjtJeF3wNBfzKvXQ/A8KnhYj30lrQ FHgeL/R98JqmemnSkHwe =3uNs -----END PGP SIGNATURE-----
--=-HYLceZwRBNeJ1N9MWqx+--
--===============1731253972195970659== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============1731253972195970659==--
|