Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: USN-1383-1
Distribution: Ubuntu
Plattformen: Ubuntu 11.04
Datum: Di, 6. März 2012, 16:31
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1759
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1927
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2182
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2498
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2518
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3619
Applikationen: Linux

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--===============7722388457967285106==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="------------enigE0E5D6F8F703376229D2E6BE"

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigE0E5D6F8F703376229D2E6BE
Content-Type: multipart/mixed;
boundary="------------040700070702070307050503"

This is a multi-part message in MIME format.
--------------040700070702070307050503
Content-Type: text/plain; charset=ISO-8859-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-1383-1
March 06, 2012

linux-ti-omap4 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 11.04

Summary:

Several security issues were fixed in the kernel.

Software Description:
- linux-ti-omap4: Linux kernel for OMAP4

Details:

Aristide Fattori and Roberto Paleari reported a flaw in the Linux kernel's
handling of IPv4 icmp packets. A remote user could exploit this to cause a
denial of service. (CVE-2011-1927)

Dan Rosenberg reported an error in the old ABI compatibility layer of ARM
kernels. A local attacker could exploit this flaw to cause a denial of
service or gain root privileges. (CVE-2011-1759)

Ben Hutchings reported a flaw in the kernel's handling of corrupt LDM
partitions. A local user could exploit this to cause a denial of service or
escalate privileges. (CVE-2011-2182)

The linux kernel did not properly account for PTE pages when deciding which
task to kill in out of memory conditions. A local, unprivileged could
exploit this flaw to cause a denial of service. (CVE-2011-2498)

A flaw was discovered in the TOMOYO LSM's handling of mount system calls.
An unprivileged user could oops the system causing a denial of service.
(CVE-2011-2518)

A flaw was discovered in the Linux kernel's AppArmor security interface
when invalid information was written to it. An unprivileged local user
could use this to cause a denial of service on the system. (CVE-2011-3619)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 11.04:
linux-image-2.6.38-1209-omap4 2.6.38-1209.22

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1383-1
CVE-2011-1759, CVE-2011-1927, CVE-2011-2182, CVE-2011-2498,
CVE-2011-2518, CVE-2011-3619

Package Information:
https://launchpad.net/ubuntu/+source/linux-ti-omap4/2.6.38-1209.22


--------------040700070702070307050503
Content-Type: text/plain; charset=UTF-8;
name="Attached Message Part"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
filename="Attached Message Part"


--------------040700070702070307050503--

--------------enigE0E5D6F8F703376229D2E6BE
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQIcBAEBCgAGBQJPVitgAAoJEAUvNnAY1cPY/SQQAIaYaGsZoI6KvBlsat9Hrf0V
ACfCYp4ZHQg84CKNfLjaI3YphVNqBxRZYx4zIkeH/eGWHz5Yst6vXk0xirFJXnRY
667A9hD49eGw360LATjYeaYv8uFCn12nJX5+PqdcluRJN1MTteeMKVBcLCtc3Uhl
khtbtCjRHWiwaQVgl/bFHPQrvq9M4IZV/c3MlXy1DWK6LEsEFQ2Sk2vu+zX5rpuL
Iy57xWStNsLly25nzg0SR+6Sh5+nYx46p9Kz3Pu1v4LN/KD2sWi8x85E/n6YXWAf
r3XiGMFSIAMpEwpVPVi0XYLIYDvXBVhOPDQAYw6twsbgB5aHsafdzZhcP/UfAdoD
qMsy7W4HsNRuFxQ/AlQ/859b77LdeQoVhlpc+xelZc9XAyNyFN+Pyk4uV59WpDx1
aHUZIT7hhrS2lxfevCziGj5p1vTiTKDu2NOW2oGO5ebHXh5VcwWonXyAelv6HOq7
qmYLrJafF38HI65kyFPTKOvqMyvPuFVztsWsL5i1PihjYfagkJkn1MhwhfgQpTXI
psWpDuHbkEKrLUMSqmIVtoYmF5ljkLuPfaC6HUyPigkChFxvE74oG0DNBvAJG8l6
aUO+IoChLvLxuut6Tb9HuX9WlPjeH3nkFqaumm5VBFRV2lxPIch0pFFD/thm3vNB
dZ9FChtp8ugy01eYiZI3
=I9nj
-----END PGP SIGNATURE-----

--------------enigE0E5D6F8F703376229D2E6BE--


--===============7722388457967285106==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============7722388457967285106==--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung