drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Preisgabe von Informationen in Linux
Name: |
Preisgabe von Informationen in Linux |
|
ID: |
USN-1683-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 10.04 LTS |
|
Datum: |
Do, 10. Januar 2013, 14:29 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4530 |
|
Applikationen: |
Linux |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --===============0389621127721287825== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enigD3898F7ABB22C6580BA552DE"
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enigD3898F7ABB22C6580BA552DE Content-Type: multipart/mixed; boundary="------------040301000805020408030804"
This is a multi-part message in MIME format. --------------040301000805020408030804 Content-Type: text/plain; charset=ISO-8859- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-1683-1 January 10, 2013
linux vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 10.04 LTS
Summary:
The system could be made to leak sensitive system information.
Software Description: - linux: Linux kernel
Details:
A flaw was discovered in the Linux kernel's handling of script execution when module loading is enabled. A local attacker could exploit this flaw to cause a leak of kernel stack contents.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 10.04 LTS: linux-image-2.6.32-45-386 2.6.32-45.102 linux-image-2.6.32-45-generic 2.6.32-45.102 linux-image-2.6.32-45-generic-pae 2.6.32-45.102 linux-image-2.6.32-45-ia64 2.6.32-45.102 linux-image-2.6.32-45-lpia 2.6.32-45.102 linux-image-2.6.32-45-powerpc 2.6.32-45.102 linux-image-2.6.32-45-powerpc-smp 2.6.32-45.102 linux-image-2.6.32-45-powerpc64-smp 2.6.32-45.102 linux-image-2.6.32-45-preempt 2.6.32-45.102 linux-image-2.6.32-45-server 2.6.32-45.102 linux-image-2.6.32-45-sparc64 2.6.32-45.102 linux-image-2.6.32-45-sparc64-smp 2.6.32-45.102 linux-image-2.6.32-45-versatile 2.6.32-45.102 linux-image-2.6.32-45-virtual 2.6.32-45.102
After a standard system update you need to reboot your computer to make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-1683-1 CVE-2012-4530
Package Information: https://launchpad.net/ubuntu/+source/linux/2.6.32-45.102
--------------040301000805020408030804 Content-Type: text/plain; charset=UTF-8; name="Attached Message Part" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="Attached Message Part"
--------------040301000805020408030804--
--------------enigD3898F7ABB22C6580BA552DE Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with undefined - http://www.enigmail.net/
iQIcBAEBCgAGBQJQ7rtBAAoJEAUvNnAY1cPYjNEQALELy03pPxLw9UUC0xFRRRpc PIGMxG+fpA59eDjWWyVTkPUM5lyCYeeahd5/OiRb2IsvGRsEPz7bUSY3kB6/NopP X5o6+PmMMgT4kXC0JAP8YDm14c6cIAnPVFzomFRcxAgjJ6P4+nPunnOS7ws9QVAc urHTcrSnoWYQ8yJ724zX8cJ77XbIJJwdLQ5V3u6omtwySPSjToOcYrhDZKCL9cO5 HgiPKujJXioLdCb5FJKef+mAkT57fjFdwKW9vxKIXve646KVFOMMl2NdfIlVbxaB N80HWL6d9VE3z2TJeAz6yCrauj8LF9GJgVhnzMnEYtH2Op9yJIwnGLrIagDqpKb4 1PzWuII6KrjkrlDx/iA5HGuffqEOLL6K2PCsmmxtpGbebLGTreUGbMAzAoTEqEeB crJmkrGdIt42KsDZI8FOg9LyqnR7A3HjKhjcWAKx0jEolpayjr4wMCHthlrjhidL Zl8ateQSI2EgTwbCVcUb2ZQUELvMk+ILtPTFUjQaJuNhkRpSSRwC50cas7UyxESp UYxAXiFDJqp/QjRtYtHiMEx08aFQqhDWFNmzSQK9PdP1Px5yMMjKLpqpl0UolM1n Fl+t+/W53+W5kCMln8DN0IAyNjIjZT36MPhBx905oHdkwp6WrRJbl7CT7dYiqRLn LLiObkUPozehhDX9roAU =ekPP -----END PGP SIGNATURE-----
--------------enigD3898F7ABB22C6580BA552DE--
--===============0389621127721287825== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============0389621127721287825==--
|
|
|
|