Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: USN-2112-1
Distribution: Ubuntu
Plattformen: Ubuntu 12.04 LTS
Datum: Mi, 19. Februar 2014, 07:20
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2929
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2930
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4592
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6378
Applikationen: Linux

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============4274160527412627569==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="xLbjErPBIGFIEo84cJp2XQDq7pORT8QCE"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--xLbjErPBIGFIEo84cJp2XQDq7pORT8QCE
Content-Type: text/plain; charset=UTF-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-2112-1
February 18, 2014

linux-lts-raring vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in the kernel.

Software Description:
- linux-lts-raring: Linux hardware enablement kernel from Raring

Details:

Vasily Kulikov reported a flaw in the Linux kernel's implementation of
ptrace. An unprivileged local user could exploit this flaw to obtain
sensitive information from kernel memory. (CVE-2013-2929)

Dave Jones and Vince Weaver reported a flaw in the Linux kernel's perf
event subsystem that allows normal users to enable function tracing. An
unprivileged local user could exploit this flaw to obtain potentially
sensitive information from the kernel. (CVE-2013-2930)

A flaw in the handling of memory regions of the kernel virtual machine
(KVM) subsystem was discovered. A local user with the ability to assign a
device could exploit this flaw to cause a denial of service (memory
consumption). (CVE-2013-4592)

Nico Golde and Fabian Yamaguchi reported a flaw in the Linux kernel's
debugfs filesystem. An administrative local user could exploit this flaw to
cause a denial of service (OOPS). (CVE-2013-6378)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
linux-image-3.8.0-36-generic 3.8.0-36.52~precise1

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References:
http://www.ubuntu.com/usn/usn-2112-1
CVE-2013-2929, CVE-2013-2930, CVE-2013-4592, CVE-2013-6378

Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-raring/3.8.0-36.52~precise1



--xLbjErPBIGFIEo84cJp2XQDq7pORT8QCE
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=10BJ
-----END PGP SIGNATURE-----

--xLbjErPBIGFIEo84cJp2XQDq7pORT8QCE--


--===============4274160527412627569==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============4274160527412627569==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung