drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Linux
Name: |
Mehrere Probleme in Linux |
|
ID: |
USN-1303-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 10.10 |
|
Datum: |
Di, 13. Dezember 2011, 16:30 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1162
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4077
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4081
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4132
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4326
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4330 |
|
Applikationen: |
Linux |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --===============1012970950360723054== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enigD11E706965F293B412A71891"
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enigD11E706965F293B412A71891 Content-Type: text/plain; charset=ISO-8859- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-1303-1 December 13, 2011
linux-mvl-dove vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 10.10
Summary:
Several security issues were fixed in the kernel.
Software Description: - linux-mvl-dove: Linux kernel for DOVE
Details:
Peter Huewe discovered an information leak in the handling of reading security-related TPM data. A local, unprivileged user could read the results of a previous TPM command. (CVE-2011-1162)
A bug was discovered in the XFS filesystem's handling of pathnames. A local attacker could exploit this to crash the system, leading to a denial of service, or gain root privileges. (CVE-2011-4077)
Nick Bowler discovered the kernel GHASH message digest algorithm incorrectly handled error conditions. A local attacker could exploit this to cause a kernel oops. (CVE-2011-4081)
A flaw was found in the Journaling Block Device (JBD). A local attacker able to mount ext3 or ext4 file systems could exploit this to crash the system, leading to a denial of service. (CVE-2011-4132)
A bug was found in the way headroom check was performed in udp6_ufo_fragment() function. A remote attacker could use this flaw to crash the system. (CVE-2011-4326)
Clement Lecigne discovered a bug in the HFS file system bounds checking. When a malformed HFS file system is mounted a local user could crash the system or gain root privileges. (CVE-2011-4330)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 10.10: linux-image-2.6.32-421-dove 2.6.32-421.39
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. If you use linux-restricted-modules, you have to update that package as well to get modules which work with the new kernel version. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-server, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: http://www.ubuntu.com/usn/usn-1303-1 CVE-2011-1162, CVE-2011-4077, CVE-2011-4081, CVE-2011-4132, CVE-2011-4326, CVE-2011-4330
Package Information: https://launchpad.net/ubuntu/+source/linux-mvl-dove/2.6.32-421.39
--------------enigD11E706965F293B412A71891 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iQIcBAEBCgAGBQJO50+3AAoJEAUvNnAY1cPYicsP/03SpkOk5Z57bjbi2Q2WvcHO glrDeBCsArUr9+48ApAc47STPIOcRz7iLvo95H/rwM/Aw5Hu8sXYPDgav4XyRVAa mvn+CNbQ82ANga3dHDqzYHQaSn4jzjbKbUSN8c1e99v/7dqT4SkD4hJ8VQoKaJXt grs/rpNEcqNMXU2u9299h9pehzuUzgmuzj3gBuextqtTUFzDgWM2mEMov+iItG98 UQF+uRF2W7IX+tpfnB8GghJys8dD2d0JASO5EajXLka7NVcmuXBelvRrlIQUiFPX /wV+BUtpfIjdrzPULiklZUh6TANEa77rZyuJOyFUkAx6p/V62QDDbI6LwxB1Op4F NgEOaxx6zObOAP86cSmgPqbFNcpMrRou4zz73VeGHKw0/JuoHtxQ6sx+YJo4YI3o mNQcYjP3AuK1a4J6lbMGw1NZvc5t6nHVfw67c0SD4Z6nPLiM7O7dd2Sf0KLEngGm aMoVjdQ0+crn69jx/S+P4BQd6wtphEv5O4XwLZ/s6pORFNq4OE1cnVQ9lEw/PnvW qbSOFBBjdjUSrlp6iqxne8UVqsKHq7TmrpyUtbyVVaFe3KRh00cTfHo721UjDCiU jLSEpKMATmYP8jorj7CBpqBs7SiewPvDgVjD56vFB4/751D2wLqmFuTDtwBuIFut CUmaBjhZ1MMkZNYc97GZ =ytgo -----END PGP SIGNATURE-----
--------------enigD11E706965F293B412A71891--
--===============1012970950360723054== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============1012970950360723054==--
|
|
|
|