drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Umgehung der Firewall in Linux
Name: |
Umgehung der Firewall in Linux |
|
ID: |
USN-1661-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 10.04 LTS |
|
Datum: |
Di, 11. Dezember 2012, 07:47 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4444 |
|
Applikationen: |
Linux |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --===============0523426218282056340== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enigEA71050075B7865BB89FF974"
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enigEA71050075B7865BB89FF974 Content-Type: multipart/mixed; boundary="------------000304090301030701090808"
This is a multi-part message in MIME format. --------------000304090301030701090808 Content-Type: text/plain; charset=ISO-8859- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-1661-1 December 11, 2012
linux vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 10.04 LTS
Summary:
The system's firewall could be bypassed by a remote attacker.
Software Description: - linux: Linux kernel
Details:
Zhang Zuotao discovered a bug in the Linux kernel's handling of overlapping fragments in ipv6. A remote attacker could exploit this flaw to bypass firewalls and initial new network connections that should have been blocked by the firewall.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 10.04 LTS: linux-image-2.6.32-45-386 2.6.32-45.101 linux-image-2.6.32-45-generic 2.6.32-45.101 linux-image-2.6.32-45-generic-pae 2.6.32-45.101 linux-image-2.6.32-45-ia64 2.6.32-45.101 linux-image-2.6.32-45-lpia 2.6.32-45.101 linux-image-2.6.32-45-powerpc 2.6.32-45.101 linux-image-2.6.32-45-powerpc-smp 2.6.32-45.101 linux-image-2.6.32-45-powerpc64-smp 2.6.32-45.101 linux-image-2.6.32-45-preempt 2.6.32-45.101 linux-image-2.6.32-45-server 2.6.32-45.101 linux-image-2.6.32-45-sparc64 2.6.32-45.101 linux-image-2.6.32-45-sparc64-smp 2.6.32-45.101 linux-image-2.6.32-45-versatile 2.6.32-45.101 linux-image-2.6.32-45-virtual 2.6.32-45.101
After a standard system update you need to reboot your computer to make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-1661-1 CVE-2012-4444
Package Information: https://launchpad.net/ubuntu/+source/linux/2.6.32-45.101
--------------000304090301030701090808 Content-Type: text/plain; charset=UTF-8; name="Attached Message Part" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="Attached Message Part"
--------------000304090301030701090808--
--------------enigEA71050075B7865BB89FF974 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with undefined - http://www.enigmail.net/
iQIcBAEBCgAGBQJQxruhAAoJEAUvNnAY1cPYjzsQAJwjLe/8V5bs9coBLKZ8Qx7o 1/sIAEMBfV37vy2BD2FAyUJf8qRkQNj/f+OLcAOnt7omn/ggTW6cJQto+EmqSTxf ETFemPemSkNuFhQ16pAB/OWS47g7InBzfJ9qWhgVM5dbigbw4KEjN2eBDeqYEVmB xYKYCtMrnZzqONKVd1Z32mr82wa/BnfnVYG6bHhRl9MEN7xc9/0rZ6ET5JZ4wj+T EUQkTDh/k1WvPe1ys7PXYgasKtenvwyfD9V8oyyc020kk9r2uj70egwLq5b3bxov tiZgwlBQAoS5MqLnN20iog8YNboiCgN6sIUe8yb7Iowqin/yY3xQxm9hEnWDLB8K hO0YCA5I86vxX38dh2pQvWiqiT7YHzK0dqkzJwwYtPOLEsozp9C+DfaV/QLB4OA0 KG2iCFHThp9tnkEkdz2/IbwZeqQRpohJNTbYvIuFzKsc6EU/eZyQP9I3pQE0Q4xZ T8v3mgHcTtUt3qz0Jf7HrucS1Onzb6apdZtd+mhH5mApOj8aBM2dlnttbQGYhh3w koU1jag6N8HtoqfgdAMR9BrbJ26ijKbdhzJKigMahqh2TbQjLUwWY3P9hf3q7KS4 gi+TP300dcp7T+swI1gZyv5uAjgkmfoZ67bN31mx/ZIziXhJascJBk5iQNL/rd6R u4QgdBEqo9cZJxlou1dQ =4GCs -----END PGP SIGNATURE-----
--------------enigEA71050075B7865BB89FF974--
--===============0523426218282056340== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============0523426218282056340==--
|
|
|
|