Login
Newsletter
Werbung

Sicherheit: Denial of Service in Linux
Aktuelle Meldungen Distributionen
Name: Denial of Service in Linux
ID: USN-1329-1
Distribution: Ubuntu
Plattformen: Ubuntu 11.04
Datum: Fr, 13. Januar 2012, 07:03
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3353
Applikationen: Linux

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--===============5078581786084406956==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="------------enig937659E9F107128BEDF04875"

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig937659E9F107128BEDF04875
Content-Type: multipart/mixed;
boundary="------------030603050502040305030609"

This is a multi-part message in MIME format.
--------------030603050502040305030609
Content-Type: text/plain; charset=ISO-8859-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-1329-1
January 13, 2012

linux-ti-omap4 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 11.04

Summary:

The system could be made to crash under certain conditions.

Software Description:
- linux-ti-omap4: Linux kernel for OMAP4

Details:

Han-Wen Nienhuys reported a flaw in the FUSE kernel module. A local user
who can mount a FUSE file system could cause a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 11.04:
linux-image-2.6.38-1209-omap4 2.6.38-1209.20

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1329-1
CVE-2011-3353

Package Information:
https://launchpad.net/ubuntu/+source/linux-ti-omap4/2.6.38-1209.20


--------------030603050502040305030609
Content-Type: text/plain;
name="Attached Message Part"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
filename="Attached Message Part"


--------------030603050502040305030609--

--------------enig937659E9F107128BEDF04875
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=1RAN
-----END PGP SIGNATURE-----

--------------enig937659E9F107128BEDF04875--


--===============5078581786084406956==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============5078581786084406956==--
Pro-Linux
Gewinnspiel
Neue Nachrichten
Werbung