Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: USN-1323-1
Distribution: Ubuntu
Plattformen: Ubuntu 8.04 LTS
Datum: Mi, 11. Januar 2012, 11:31
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1162
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2203
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3359
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4110
Applikationen: Linux

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--===============2842240397518308630==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="------------enig9643D0BA9C1689F98DF1B5E4"

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig9643D0BA9C1689F98DF1B5E4
Content-Type: multipart/mixed;
boundary="------------090604010900020203060000"

This is a multi-part message in MIME format.
--------------090604010900020203060000
Content-Type: text/plain; charset=ISO-8859-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-1323-1
January 11, 2012

linux vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 8.04 LTS

Summary:

Several security issues were fixed in the kernel.

Software Description:
- linux: Linux kernel

Details:

Peter Huewe discovered an information leak in the handling of reading
security-related TPM data. A local, unprivileged user could read the
results of a previous TPM command. (CVE-2011-1162)

Clement Lecigne discovered a bug in the HFS filesystem. A local attacker
could exploit this to cause a kernel oops. (CVE-2011-2203)

A flaw was found in the b43 driver in the Linux kernel. An attacker could
use this flaw to cause a denial of service if the system has an active
wireless interface using the b43 driver. (CVE-2011-3359)

A flaw was found in how the Linux kernel handles user-defined key types. An
unprivileged local user could exploit this to crash the system.
(CVE-2011-4110)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 8.04 LTS:
linux-image-2.6.24-30-386 2.6.24-30.98
linux-image-2.6.24-30-generic 2.6.24-30.98
linux-image-2.6.24-30-hppa32 2.6.24-30.98
linux-image-2.6.24-30-hppa64 2.6.24-30.98
linux-image-2.6.24-30-itanium 2.6.24-30.98
linux-image-2.6.24-30-lpia 2.6.24-30.98
linux-image-2.6.24-30-lpiacompat 2.6.24-30.98
linux-image-2.6.24-30-mckinley 2.6.24-30.98
linux-image-2.6.24-30-openvz 2.6.24-30.98
linux-image-2.6.24-30-powerpc 2.6.24-30.98
linux-image-2.6.24-30-powerpc-smp 2.6.24-30.98
linux-image-2.6.24-30-powerpc64-smp 2.6.24-30.98
linux-image-2.6.24-30-rt 2.6.24-30.98
linux-image-2.6.24-30-server 2.6.24-30.98
linux-image-2.6.24-30-sparc64 2.6.24-30.98
linux-image-2.6.24-30-sparc64-smp 2.6.24-30.98
linux-image-2.6.24-30-virtual 2.6.24-30.98
linux-image-2.6.24-30-xen 2.6.24-30.98

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1323-1
CVE-2011-1162, CVE-2011-2203, CVE-2011-3359, CVE-2011-4110

Package Information:
https://launchpad.net/ubuntu/+source/linux/2.6.24-30.98


--------------090604010900020203060000
Content-Type: text/plain;
name="Attached Message Part"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
filename="Attached Message Part"


--------------090604010900020203060000--

--------------enig9643D0BA9C1689F98DF1B5E4
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=WloC
-----END PGP SIGNATURE-----

--------------enig9643D0BA9C1689F98DF1B5E4--


--===============2842240397518308630==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============2842240397518308630==--
Pro-Linux
Gewinnspiel
Neue Nachrichten
Werbung