[ubuntu-cloud] Refreshed UEC Images of 11.04 LTS (Natty Narwhal) [20111003]
Ben Howard
ben.howard at canonical.com
Tue Oct 4 21:52:38 UTC 2011
CORRECTION:
I incorrectly stated that 11.04 is a LTS release. 11.04 is NOT an LTS
release and is normal stable release.
The opening paragraph should have read: "A new release of the Ubuntu
Cloud Images for stable Ubuntu release 11.04 (Natty Narwhal) is
available at [1]. These new images superseded the existing images [2].
Images are available for download or immediate use on EC2 via publish
AMI ids."
My apologies for any confusion this typo may have caused.
~Ben
On 10/04/2011 03:15 PM, Ben Howard wrote:
> A new release of the Ubuntu Cloud Images for stable Ubuntu
> release 11.04 LTS (Natty Narwhal) is available at [1]. These new images
> superseded the existing images [2]. Images are available for download or
> immediate use on EC2 via publish AMI ids. Users who wish to update their
> existing installations can do so with:
> 'apt-get update && apt-get distupgrade && reboot'.
>
> Updates of Interest:
> * linux-virtual and linux-ec2 updated [3,4]. Multiple CVE's fixed [5]
> * apt: incorrect InRelease file signature validation (CVE-2011-1829)
> * bind9
> - denial of service via specially crafted packet. (CVE-2011-2464)
> - denial of service via off-by-one. (CVE-2011-1910)
> * ca-certificates: Blacklist "DigiNotar Root CA" due to fraudulent
> certificate issuance
> * dbus: denial of service via messages with non-native byte order.
> (CVE-2011-2200)
> * libxml2: denial of service and possible code execution viaspecially
> crafted xml file. (CVE-2011-1944)
> * logrotate
> - arbitrary code execution via shell metacharacters in log filename
> (CVE-2011-1154)
> - denial of service via invalid characters in log filename
> (CVE-2011-1155)
> * libcurl: libcurl unconditional credential delegation during GSSAPI
> authentication vulnerability. (CVE-2011-2192)
> * pam
> - multiple issues with lack of adequate privilege dropping
> (CVE-2010-3430, CVE-2010-3431, CVE-2010-3435, CVE-2010-4706
> CVE-2010-4707)
> - privilege escalation via incorrect environment. (CVE-2010-3853)
> * perl
> - multiple intended restriction bypasses in Safe.pm. (CVE-2010-1447)
> - taint protection bypass via missing taint attributes.
> (CVE-2011-1487)
>
> Complete package change lists (please see the full changelogs for
> comprehensive
> list of changes):
> * apport 1.20.1-0ubuntu5.1
> * apt 0.8.13.2ubuntu4.2
> * bind9 19.7.3.dfsg-1ubuntu2.2
> * ca-certificates 20090814+nmu2ubuntu0.1
> * curl 7.21.3-1ubuntu1.3
> * dbus 1.4.6-1ubuntu6.1
> * dpkg 1.16.0~ubuntu7.1
> * freetype 2.4.4-1ubuntu2.1
> * initramfs-tools 0.98.8ubuntu3.1
> * isc-dhcp 4.1.1-P1-15ubuntu9.1
> * landscape-client 11.07.1.1-0ubuntu0.11.04.0
> * language-selector 0.34.2
> * libpng 1.2.44-1ubuntu3.1
> * libxml2 2.7.8.dfsg-2ubuntu0.1
> * linux 2.6.38-11.50
> * linux-meta 2.6.38.11.26
> * logrotate 3.7.8-6ubuntu3.1
> * lxc 0.7.4-0ubuntu7.1
> * ntp 14.2.6.p2+dfsg-1ubuntu5.1
> * pam 1.1.2-2ubuntu8.3
> * perl 5.10.1-17ubuntu4.1
> * plymouth 0.8.2-2ubuntu23
> * pygobject 2.28.3-1ubuntu1.1
> * python-apt 0.7.100.3ubuntu6.1
> * smart 1.3-1.3ubuntu0.2
> * sudo 1.7.4p4-5ubuntu7.1
> * tzdata 2011j-0ubuntu0.11.04
> * update-manager 10.150.3
>
>
>
>
> --
>
> [1] http://uec-images.ubuntu.com/server/releases/natty/release-20111003/
> [2] http://uec-images.ubuntu.com/server/releases/natty/release-20110426/
> [3] https://launchpad.net/ubuntu/+source/linux
> [4] https://launchpad.net/ubuntu/+source/linux/2.6.38-11.50
> [5] Kernel CVEs:
> https://bugs.launchpad.net/bugs/cve/2010-1020
> https://bugs.launchpad.net/bugs/cve/2011-1493
> https://bugs.launchpad.net/bugs/cve/2011-2689
> https://bugs.launchpad.net/bugs/cve/2011-2699
> https://bugs.launchpad.net/bugs/cve/2011-2918
> https://bugs.launchpad.net/bugs/cve/2011-1581
> https://bugs.launchpad.net/bugs/cve/2011-2484
> https://bugs.launchpad.net/bugs/cve/2011-2493
> https://bugs.launchpad.net/bugs/cve/2011-1017
>
--
Ben Howard
ben.howard at canonical.com
Canonical USA, Inc
GPG ID 0x5406A866
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-cloud/attachments/20111004/62b07e1f/attachment.pgp>
More information about the Ubuntu-cloud
mailing list