Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: USN-1940-1
Distribution: Ubuntu
Plattformen: Ubuntu 10.04 LTS
Datum: Fr, 6. September 2013, 23:21
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1060
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1943
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2206
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4162
Applikationen: Linux

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--===============6403732691308075324==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="------------enigC069EC490B479DC46C05314A"

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigC069EC490B479DC46C05314A
Content-Type: text/plain; charset=UTF-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-1940-1
September 06, 2013

linux-ec2 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 10.04 LTS

Summary:

Several security issues were fixed in the kernel.

Software Description:
- linux-ec2: Linux kernel for EC2

Details:

Vasily Kulikov discovered a flaw in the Linux Kernel's perf tool that
allows for privilege escalation. A local user could exploit this flaw to
run commands as root when using the perf tool. (CVE-2013-1060)

Michael S. Tsirkin discovered a flaw in how the Linux kernel's KVM
subsystem allocates memory slots for the guest's address space. A local
user could exploit this flaw to gain system privileges or obtain sensitive
information from kernel memory. (CVE-2013-1943)

A flaw was discovered in the SCTP (stream control transfer protocol)
network protocol's handling of duplicate cookies in the Linux kernel. A
remote attacker could exploit this flaw to cause a denial of service
(system crash) on another remote user querying the SCTP connection.
(CVE-2013-2206)

Hannes Frederic Sowa discovered a flaw in setsockopt UDP_CORK option in the
Linux kernel's IPv6 stack. A local user could exploit this flaw to cause a
denial of service (system crash). (CVE-2013-4162)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 10.04 LTS:
linux-image-2.6.32-356-ec2 2.6.32-356.69

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References:
http://www.ubuntu.com/usn/usn-1940-1
CVE-2013-1060, CVE-2013-1943, CVE-2013-2206, CVE-2013-4162

Package Information:
https://launchpad.net/ubuntu/+source/linux-ec2/2.6.32-356.69



--------------enigC069EC490B479DC46C05314A
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/
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=KVKa
-----END PGP SIGNATURE-----

--------------enigC069EC490B479DC46C05314A--


--===============6403732691308075324==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============6403732691308075324==--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung