drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Denial of Service in Linux
Name: |
Denial of Service in Linux |
|
ID: |
USN-1313-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 10.04 LTS |
|
Datum: |
Mo, 19. Dezember 2011, 21:33 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4081 |
|
Applikationen: |
Linux |
|
Originalnachricht |
--===============2489708432483434431== Content-Type: multipart/signed; micalg="pgp-sha512"; protocol="application/pgp-signature"; boundary="=-DGUV7yv1z2rkkH0z4y1X"
--=-DGUV7yv1z2rkkH0z4y1X Content-Type: text/plain; charset="UTF-8 Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-1313-1 December 19, 2011
linux-lts-backport-oneiric vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description: - linux-lts-backport-oneiric: Linux kernel backport from Oneiric
Details:
Nick Bowler discovered the kernel GHASH message digest algorithm incorrectly handled error conditions. A local attacker could exploit this to cause a kernel oops.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 10.04 LTS: linux-image-3.0.0-14-generic 3.0.0-14.23~lucid1 linux-image-3.0.0-14-generic-pae 3.0.0-14.23~lucid1 linux-image-3.0.0-14-server 3.0.0-14.23~lucid1 linux-image-3.0.0-14-virtual 3.0.0-14.23~lucid1
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. If you use linux-restricted-modules, you have to update that package as well to get modules which work with the new kernel version. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-server, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: http://www.ubuntu.com/usn/usn-1313-1 CVE-2011-4081
Package Information: https://launchpad.net/ubuntu/+source/linux-lts-backport-oneiric/3.0.0-14.23~lucid1
--ÝGUV7yv1z2rkkH0z4y1X Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part Content-Transfer-Encoding: 7bit
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux)
iQIcBAABCgAGBQJO75k3AAoJEGVp2FWnRL6TkfIP/j2IUbPjkoZuIoC700I3PXjb UPghDSmiTNDebPLD6yjLW1qdsJxc/gGyBTOhW6x8oDiO2GLUnkuEckFtMW5zCErm CTyqBtwAEY7+rRdiv19Y7h2AdftL5WYQvCZTItdnbZoxQEx1dqHLcssTSw6l2+e9 l/5EPkGBiz/RWa2lNaT/1b4jasQ5lQUbGy/FI4Ew2P+ZE85sIG907YJXtu1HngwY 4vaUnTTNWCWBEeO+WHhSbsoJwmf8Lns8cxy/tqpkJ7GXMyGizKM6xFIHFCij9Q3o VJS0fEa9l/P+7hMLkkIjgeO/KaIJrd2NXscDgUtGte+s6rpFF0q/y3JzcPJGNgEk jX2QTKrPeGWQ8bAmdiM/b4N7ou/nzogKX6Nj9a4mEU+zsipP5/XBIrZq7Z15ZNnf MlsPUK0zI8kSWMLOCL1DLX5ChyZ6eqvmhqr0aiqDLlTT8DtSYIj6ASqbJ5L4QxhI x3SR+KocnNnKVxopt1DQJ9/32mLIpfGKb7HTgnRegUnasAzyHo6gjPARDxmzJh+K J763R3tEm2dRVSurQyYeTsJo/n9RNarTKVy6/NjqhL259Se4z6ZokbQb1uNbI1E4 TSUBr/axnTYTAR8nz7pIwhU3+8MAoMnMrXpvfRWxPderg+zGDZcpjWO3IqvpHJhJ cDxsOQH/T5quH25wvu7C =XHH2 -----END PGP SIGNATURE-----
--=-DGUV7yv1z2rkkH0z4y1X--
--===============2489708432483434431== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============2489708432483434431==--
|
|
|
|