Login
Newsletter
Werbung

Sicherheit: Denial of Service in Linux
Aktuelle Meldungen Distributionen
Name: Denial of Service in Linux
ID: USN-1313-1
Distribution: Ubuntu
Plattformen: Ubuntu 10.04 LTS
Datum: Mo, 19. Dezember 2011, 21:33
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4081
Applikationen: Linux

Originalnachricht


--===============2489708432483434431==
Content-Type: multipart/signed; micalg="pgp-sha512";
protocol="application/pgp-signature";
boundary="=-DGUV7yv1z2rkkH0z4y1X"


--=-DGUV7yv1z2rkkH0z4y1X
Content-Type: text/plain; charset="UTF-8
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-1313-1
December 19, 2011

linux-lts-backport-oneiric vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 10.04 LTS

Summary:

Several security issues were fixed in the kernel.

Software Description:
- linux-lts-backport-oneiric: Linux kernel backport from Oneiric

Details:

Nick Bowler discovered the kernel GHASH message digest algorithm
incorrectly handled error conditions. A local attacker could exploit this
to cause a kernel oops.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 10.04 LTS:
linux-image-3.0.0-14-generic 3.0.0-14.23~lucid1
linux-image-3.0.0-14-generic-pae 3.0.0-14.23~lucid1
linux-image-3.0.0-14-server 3.0.0-14.23~lucid1
linux-image-3.0.0-14-virtual 3.0.0-14.23~lucid1

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References:
http://www.ubuntu.com/usn/usn-1313-1
CVE-2011-4081

Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-backport-oneiric/3.0.0-14.23~lucid1



--ÝGUV7yv1z2rkkH0z4y1X
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
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=XHH2
-----END PGP SIGNATURE-----

--=-DGUV7yv1z2rkkH0z4y1X--



--===============2489708432483434431==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============2489708432483434431==--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung