drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Linux
Name: |
Mehrere Probleme in Linux |
|
ID: |
USN-1383-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 11.04 |
|
Datum: |
Di, 6. März 2012, 16:31 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1759
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1927
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2182
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2498
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2518
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3619 |
|
Applikationen: |
Linux |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --===============7722388457967285106== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enigE0E5D6F8F703376229D2E6BE"
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enigE0E5D6F8F703376229D2E6BE Content-Type: multipart/mixed; boundary="------------040700070702070307050503"
This is a multi-part message in MIME format. --------------040700070702070307050503 Content-Type: text/plain; charset=ISO-8859- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-1383-1 March 06, 2012
linux-ti-omap4 vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 11.04
Summary:
Several security issues were fixed in the kernel.
Software Description: - linux-ti-omap4: Linux kernel for OMAP4
Details:
Aristide Fattori and Roberto Paleari reported a flaw in the Linux kernel's handling of IPv4 icmp packets. A remote user could exploit this to cause a denial of service. (CVE-2011-1927)
Dan Rosenberg reported an error in the old ABI compatibility layer of ARM kernels. A local attacker could exploit this flaw to cause a denial of service or gain root privileges. (CVE-2011-1759)
Ben Hutchings reported a flaw in the kernel's handling of corrupt LDM partitions. A local user could exploit this to cause a denial of service or escalate privileges. (CVE-2011-2182)
The linux kernel did not properly account for PTE pages when deciding which task to kill in out of memory conditions. A local, unprivileged could exploit this flaw to cause a denial of service. (CVE-2011-2498)
A flaw was discovered in the TOMOYO LSM's handling of mount system calls. An unprivileged user could oops the system causing a denial of service. (CVE-2011-2518)
A flaw was discovered in the Linux kernel's AppArmor security interface when invalid information was written to it. An unprivileged local user could use this to cause a denial of service on the system. (CVE-2011-3619)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 11.04: linux-image-2.6.38-1209-omap4 2.6.38-1209.22
After a standard system update you need to reboot your computer to make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-1383-1 CVE-2011-1759, CVE-2011-1927, CVE-2011-2182, CVE-2011-2498, CVE-2011-2518, CVE-2011-3619
Package Information: https://launchpad.net/ubuntu/+source/linux-ti-omap4/2.6.38-1209.22
--------------040700070702070307050503 Content-Type: text/plain; charset=UTF-8; name="Attached Message Part" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="Attached Message Part"
--------------040700070702070307050503--
--------------enigE0E5D6F8F703376229D2E6BE Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iQIcBAEBCgAGBQJPVitgAAoJEAUvNnAY1cPY/SQQAIaYaGsZoI6KvBlsat9Hrf0V ACfCYp4ZHQg84CKNfLjaI3YphVNqBxRZYx4zIkeH/eGWHz5Yst6vXk0xirFJXnRY 667A9hD49eGw360LATjYeaYv8uFCn12nJX5+PqdcluRJN1MTteeMKVBcLCtc3Uhl khtbtCjRHWiwaQVgl/bFHPQrvq9M4IZV/c3MlXy1DWK6LEsEFQ2Sk2vu+zX5rpuL Iy57xWStNsLly25nzg0SR+6Sh5+nYx46p9Kz3Pu1v4LN/KD2sWi8x85E/n6YXWAf r3XiGMFSIAMpEwpVPVi0XYLIYDvXBVhOPDQAYw6twsbgB5aHsafdzZhcP/UfAdoD qMsy7W4HsNRuFxQ/AlQ/859b77LdeQoVhlpc+xelZc9XAyNyFN+Pyk4uV59WpDx1 aHUZIT7hhrS2lxfevCziGj5p1vTiTKDu2NOW2oGO5ebHXh5VcwWonXyAelv6HOq7 qmYLrJafF38HI65kyFPTKOvqMyvPuFVztsWsL5i1PihjYfagkJkn1MhwhfgQpTXI psWpDuHbkEKrLUMSqmIVtoYmF5ljkLuPfaC6HUyPigkChFxvE74oG0DNBvAJG8l6 aUO+IoChLvLxuut6Tb9HuX9WlPjeH3nkFqaumm5VBFRV2lxPIch0pFFD/thm3vNB dZ9FChtp8ugy01eYiZI3 =I9nj -----END PGP SIGNATURE-----
--------------enigE0E5D6F8F703376229D2E6BE--
--===============7722388457967285106== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============7722388457967285106==--
|
|
|
|