drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Linux
Name: |
Mehrere Probleme in Linux |
|
ID: |
USN-1323-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 8.04 LTS |
|
Datum: |
Mi, 11. Januar 2012, 11:31 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1162
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2203
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3359
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4110 |
|
Applikationen: |
Linux |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --===============2842240397518308630== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig9643D0BA9C1689F98DF1B5E4"
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig9643D0BA9C1689F98DF1B5E4 Content-Type: multipart/mixed; boundary="------------090604010900020203060000"
This is a multi-part message in MIME format. --------------090604010900020203060000 Content-Type: text/plain; charset=ISO-8859- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-1323-1 January 11, 2012
linux vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 8.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description: - linux: Linux kernel
Details:
Peter Huewe discovered an information leak in the handling of reading security-related TPM data. A local, unprivileged user could read the results of a previous TPM command. (CVE-2011-1162)
Clement Lecigne discovered a bug in the HFS filesystem. A local attacker could exploit this to cause a kernel oops. (CVE-2011-2203)
A flaw was found in the b43 driver in the Linux kernel. An attacker could use this flaw to cause a denial of service if the system has an active wireless interface using the b43 driver. (CVE-2011-3359)
A flaw was found in how the Linux kernel handles user-defined key types. An unprivileged local user could exploit this to crash the system. (CVE-2011-4110)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 8.04 LTS: linux-image-2.6.24-30-386 2.6.24-30.98 linux-image-2.6.24-30-generic 2.6.24-30.98 linux-image-2.6.24-30-hppa32 2.6.24-30.98 linux-image-2.6.24-30-hppa64 2.6.24-30.98 linux-image-2.6.24-30-itanium 2.6.24-30.98 linux-image-2.6.24-30-lpia 2.6.24-30.98 linux-image-2.6.24-30-lpiacompat 2.6.24-30.98 linux-image-2.6.24-30-mckinley 2.6.24-30.98 linux-image-2.6.24-30-openvz 2.6.24-30.98 linux-image-2.6.24-30-powerpc 2.6.24-30.98 linux-image-2.6.24-30-powerpc-smp 2.6.24-30.98 linux-image-2.6.24-30-powerpc64-smp 2.6.24-30.98 linux-image-2.6.24-30-rt 2.6.24-30.98 linux-image-2.6.24-30-server 2.6.24-30.98 linux-image-2.6.24-30-sparc64 2.6.24-30.98 linux-image-2.6.24-30-sparc64-smp 2.6.24-30.98 linux-image-2.6.24-30-virtual 2.6.24-30.98 linux-image-2.6.24-30-xen 2.6.24-30.98
After a standard system update you need to reboot your computer to make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-1323-1 CVE-2011-1162, CVE-2011-2203, CVE-2011-3359, CVE-2011-4110
Package Information: https://launchpad.net/ubuntu/+source/linux/2.6.24-30.98
--------------090604010900020203060000 Content-Type: text/plain; name="Attached Message Part" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="Attached Message Part"
--------------090604010900020203060000--
--------------enig9643D0BA9C1689F98DF1B5E4 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iQIcBAEBCgAGBQJPDWMpAAoJEAUvNnAY1cPYruIP/2bof+AbZd02gcBUzD7M6s61 T1HA9z7fGGny6zdY+l+BQoatdnm0YKN9FD0nFY0x4qnCHAhuMPWx4ibgtbBcq9Gi yl+YGDb+hk0PST4HUS26YkLauEcvdCt7AGj50h1Y6gSqkZaUJ//k6LlvcQtKqiXW s8xmfjUxCC3uyZvuMbb1yEzjHD29h7Iz1tNPRAvk9JkdX/AT1lLbMijgVNR2dhxp vSlA7Q5NZ3kMQy96rc9JibuAZXSKpkrO71WekmOyf3GFCUOJ70N4w741Fj+5wOAz JwpGMuY3QHZFhn+2qvqSZHB5hhKqJTiz4SgzwG0hpWerFvxpC6OWHpplaXoWqZw+ 10hJBYYhaG8E9lWGgoLII6PDv7RDhhOy56H2rMjpT+/q8c+s+9u4Lvp+ZQ/VMuU0 TebXa99bxo7Fe+hFCEhVqC+aBBJql8qWedw5UUI1DgP/YbZnivGCtgSHDuQ7fuR8 u4UDOcyV54+bernZJwgx0EXXpDt9CQyzFqbk0SduNAFfOIfBatY7VYtqICqbPCg0 eIy9ziX3kh0KCe6J3Qwkuyqtsa02PvL33skiOL5tJV033Q9E1hOfDpnFkdzyntFd y8RUUfbYVRzt0acW1veAdYsL555d+drjKYD1C1cIR9H/usk5idVi5W7ZMPn2eJt3 f5s13kPM7u/lv2CKZvlu =WloC -----END PGP SIGNATURE-----
--------------enig9643D0BA9C1689F98DF1B5E4--
--===============2842240397518308630== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============2842240397518308630==--
|
|
|
|