Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in Linux
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in Linux
ID: USN-2269-1
Distribution: Ubuntu
Plattformen: Ubuntu 12.04 LTS
Datum: So, 6. Juli 2014, 12:02
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4699
Applikationen: Linux

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============4290495726755073444==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="BfqbSTtFIPd9L6nU2dJ9Ad4gIRSV2VLJw"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--BfqbSTtFIPd9L6nU2dJ9Ad4gIRSV2VLJw
Content-Type: text/plain; charset=UTF-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-2269-1
July 05, 2014

linux-lts-quantal vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 LTS

Summary:

The system could be made to crash or run programs as an administrator.

Software Description:
- linux-lts-quantal: Linux hardware enablement kernel from Quantal

Details:

Andy Lutomirski discovered a flaw with the Linux kernel's ptrace syscall on
x86_64 processors. An attacker could exploit this flaw to cause a denial of
service (System Crash) or potential gain administrative privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
linux-image-3.5.0-52-generic 3.5.0-52.79~precise1

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2269-1
CVE-2014-4699

Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-quantal/3.5.0-52.79~precise1



--BfqbSTtFIPd9L6nU2dJ9Ad4gIRSV2VLJw
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=1ugX
-----END PGP SIGNATURE-----

--BfqbSTtFIPd9L6nU2dJ9Ad4gIRSV2VLJw--


--===============4290495726755073444==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============4290495726755073444==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung