Mehrere Probleme in Linux
ID: | USN-1345-1 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 11.04 |
Datum: | Di, 24. Januar 2012, 19:06 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1162
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2203 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4110 |
Applikationen: | Linux |
Originalnachricht |
|
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --===============7263543842552274569== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enigB4C462615C55FED3D94C9A57" This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enigB4C462615C55FED3D94C9A57 Content-Type: multipart/mixed; boundary="------------060701050900030806040802" This is a multi-part message in MIME format. --------------060701050900030806040802 Content-Type: text/plain; charset=ISO-8859- Content-Transfer-Encoding: quoted-printable ========================================================================== Ubuntu Security Notice USN-1345-1 January 24, 2012 linux vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 11.04 Summary: Several security issues were fixed in the kernel. Software Description: - linux: Linux kernel Details: Peter Huewe discovered an information leak in the handling of reading security-related TPM data. A local, unprivileged user could read the results of a previous TPM command. (CVE-2011-1162) Clement Lecigne discovered a bug in the HFS filesystem. A local attacker could exploit this to cause a kernel oops. (CVE-2011-2203) A flaw was found in how the Linux kernel handles user-defined key types. An unprivileged local user could exploit this to crash the system. (CVE-2011-4110) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 11.04: linux-image-2.6.38-13-generic 2.6.38-13.54 linux-image-2.6.38-13-generic-pae 2.6.38-13.54 linux-image-2.6.38-13-omap 2.6.38-13.54 linux-image-2.6.38-13-powerpc 2.6.38-13.54 linux-image-2.6.38-13-powerpc-smp 2.6.38-13.54 linux-image-2.6.38-13-powerpc64-smp 2.6.38-13.54 linux-image-2.6.38-13-server 2.6.38-13.54 linux-image-2.6.38-13-versatile 2.6.38-13.54 linux-image-2.6.38-13-virtual 2.6.38-13.54 After a standard system update you need to reboot your computer to make all the necessary changes. References: http://www.ubuntu.com/usn/usn-1345-1 CVE-2011-1162, CVE-2011-2203, CVE-2011-4110 Package Information: https://launchpad.net/ubuntu/+source/linux/2.6.38-13.54 --------------060701050900030806040802 Content-Type: text/plain; name="Attached Message Part" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="Attached Message Part" --------------060701050900030806040802-- --------------enigB4C462615C55FED3D94C9A57 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBCgAGBQJPHu7GAAoJEAUvNnAY1cPYcisP/icz0VJTsbLCzTyABKI1DOcL k16u/jquedNH+HNnuh5sXY2M3ikSH64ZKk5X7n10EjESeb6mB64kfHFiPt0J7awN 5pN4TgxFGM3h7iKM1+v4JJqpiU3+yTHF+Uaui1JW9uKxi1CmxXvN8eF+f7XLpjiV XAfqxNFQ8/Z0QSyoxjcWIUHRHES3917sfJuoMIjOyuXkc7MptLxTlgsroqi+qY9X sWCrJTkkxZjxaH717pN3djzyZV6BZfXMphIiYRLIdV3EAt+sIx0YjC+M+RjYtD3u xvS6ilYMGWhF1dkEjHPJRttR9Udry/w0Pc+m6nIA5YS/qqPYWtpS2fVKWSA4vCIG Tw0jP5UfqmgewFDVjOjoQWZ5Kpqk8lWX+KP/qLK2foswoiHmMJpBcDorlGtM/0iJ ugB5msV+VuU0a/C1fq0GcNDcS4a5UkcYILCERd3nmNB1ZU8F9m7iVdiZyEh+5g12 mbCslCQqTyfnjzfp48o1jmkK/zxvFuGviNhf/7LhQkSHM9n+6kEp/+KdPM8ZLTY5 MsiexD5Cn+vCMlj+2kZ7lvpDFPbyE6rVVFrK7hlcwYrB5j/zMNf+jOVTMTAz8Mc2 HMYowP4uMGGofDoE/r1UbywB4xJdVsBPZT0dkDy821SGPykMUAzYLfdFI2UNA/SD TaFO5sD1Wuc+t4AWY2hR =dmdm -----END PGP SIGNATURE----- --------------enigB4C462615C55FED3D94C9A57-- --===============7263543842552274569== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce --===============7263543842552274569==-- |