drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in Linux
Name: |
Zwei Probleme in Linux |
|
ID: |
USN-1409-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 10.04 LTS |
|
Datum: |
Di, 27. März 2012, 15:09 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3347
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4347 |
|
Applikationen: |
Linux |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --===============0449271684189900033== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enigB97DEEB9970C86FB5DC76221"
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enigB97DEEB9970C86FB5DC76221 Content-Type: multipart/mixed; boundary="------------000103000008020405050609"
This is a multi-part message in MIME format. --------------000103000008020405050609 Content-Type: text/plain; charset=ISO-8859- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-1409-1 March 27, 2012
linux-lts-backport-oneiric vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description: - linux-lts-backport-oneiric: Linux kernel backport from Oneiric
Details:
Somnath Kotur discovered an error in the Linux kernel's VLAN (virtual lan) and be2net drivers. An attacker on the local network could exploit this flaw to cause a denial of service. (CVE-2011-3347)
Sasha Levin discovered a flaw in the permission checking for device assignments requested via the kvm ioctl in the Linux kernel. A local user could use this flaw to crash the system causing a denial of service. (CVE-2011-4347)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 10.04 LTS: linux-image-3.0.0-17-generic 3.0.0-17.30~lucid1 linux-image-3.0.0-17-generic-pae 3.0.0-17.30~lucid1 linux-image-3.0.0-17-server 3.0.0-17.30~lucid1 linux-image-3.0.0-17-virtual 3.0.0-17.30~lucid1
After a standard system update you need to reboot your computer to make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-1409-1 CVE-2011-3347, CVE-2011-4347
Package Information: https://launchpad.net/ubuntu/+source/linux-lts-backport-oneiric/3.0.0-17.30~lucid1
--------------000103000008020405050609 Content-Type: text/plain; charset=UTF-8; name="Attached Message Part" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="Attached Message Part"
--------------000103000008020405050609--
--------------enigB97DEEB9970C86FB5DC76221 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iQIcBAEBCgAGBQJPcbEmAAoJEAUvNnAY1cPY8rYP/0Njjy2FtH8oA7FAtp/nXqKn NI5jxpCcKY5BGVqQhgHgV1lVjYTOfEGDPZ5r2ok5lBq6J5OTwRG/Mrp11SypUnRf D3+CqXmI6kPjYev6dpedxnsFoyxutfZw6XtiTdkwObfp2seKo0yLWDj8N5MoF/b5 wf8vWpL3V1Zymy2LpRT2Y7AFaSYpK7c/1qAmGrabax3qmBLBWqSTFU/8FDUonaO/ glqbgGQk+HLCDLxHmH+pqLHP01hbmLLb1U55nVxgaYO0Q5g3QtMTX+nypy9ZuzVw NOA0Almpm2m+2M8eLF4iLhen3bzu/UpMqen1zsT0Ndp8hMkAJqpKpTKwXH4IAwvf UcQGsra3/4gbgk0EOVMbVgdDy1UUTeo0CVWsYSR6PtwZNxK2F/DHweGjgWh9e1b9 pKiYVQjjmIUa2HTF/V+geq3UjYdaaahys1oMoZqss4Qvn1tecCuid/9b+1ggPmll 6vCcnAH1v7FtSbuI1L7oZ8pdwtD4ZgCQOvu3afuI5kgm+DfsrxDFPKBLc389iQqP XX+Tkk1X7pO77j9gc9/zy+Q10C5ipv/1aYMm4kdCnim8deNh0lYYI15qHS7wUxKe 23LEU+TXt3ashmUEyJLjgZH6FQEiYUvQBnmaLDC5Ge46SJIAsp926e1fWBBlZmWa JHHV7UR2zhRfOBlsSNCu =hoe4 -----END PGP SIGNATURE-----
--------------enigB97DEEB9970C86FB5DC76221--
--===============0449271684189900033== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============0449271684189900033==--
|
|
|
|