U radu jezgre operacijskog sustava Linux uočene su dvije nove ranjivosti, čije uspješno iskorištavanje može dovesti do izvođenja DoS (eng. Denal of Service) napada.
Paket:
Linux kernel 2.6.x
Operacijski sustavi:
Fedora 15
Kritičnost:
7.4
Problem:
nepravilno rukovanje ovlastima, pogreška u programskoj komponenti
Iskorištavanje:
lokalno/udaljeno
Rješenje:
programska zakrpa proizvođača
CVE:
CVE-2011-1770, CVE-2011-1577
Izvorni ID preporuke:
FEDORA-2011-7823
Izvor:
Fedora
Problem:
Problem se javlja prilikom pokretanja DCCPO_{CHANGE,CONFIRM}_{L,R} naredbe gdje dolazi do pojave nulte vrijednosti prilikom oduzimanja. Drugi propust je posljedica problema u kodu za provjeru EFI GUID particija.
Posljedica:
Posljedice propusta mogu uzrokovati uzrokovati nepravilan rad jezgre.
Rješenje:
Kako do spomenutih problema ne bi došlo, svi se korisnici upućuju na odgovarajuću nadogradnju.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-7823
2011-06-03 05:02:51
--------------------------------------------------------------------------------
Name : kernel
Product : Fedora 15
Version : 2.6.38.7
Release : 30.fc15
URL : http://www.kernel.org/
Summary : The Linux kernel
Description :
The kernel package contains the Linux kernel (vmlinuz), the core of any
Linux operating system. The kernel handles the basic functions
of the operating system: memory allocation, process allocation, device
input and output, etc.
--------------------------------------------------------------------------------
Update Information:
Update to kernel 2.6.38.7
Also update nouveau and radeon graphics drivers to the latest upstream
versions.
--------------------------------------------------------------------------------
ChangeLog:
* Fri May 27 2011 Ben Skeggs <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 2.6.38.7-30
- nouveau: minor fixes for various issues from upstream
- nv40 modesetting fix (rhbz#708235)
- nv50+ support for LVDS panels using SPWG spec (blank/corrupt screen fixes)
- nva3+ pm clock get/set fixes
* Wed May 25 2011 Dave Airlie <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.>
- drm-radeon-update2.patch: more radeon updates + cayman accel support
* Tue May 24 2011 Kyle McMartin <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.>
- hid-multitouch: add support for elo touchsystems panels (requested
by hadess, backported from hid-next)
- bluetooth: add support for more ath3k devices (Ditto.)
* Mon May 23 2011 Chuck Ebbert <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 2.6.38.7-29
- Linux 2.6.38.7
- Eliminate hangs when using frequent high-order allocations
* Fri May 20 2011 Chuck Ebbert <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 2.6.38.7-28.rc1
- Linux 2.6.38.7-rc1
- Fix up context in utrace-ptrace.patch
- Revert radeon patches already in our radeon update:
drm-radeon-kms-fix-gart-setup-on-fusion-parts-v2-backport.patch
- Drop merged patches:
iwlwifi-add-_ack_plpc_check-module-parameters.patch
- Fix stalls on AMD Sempron notebooks (#704059)
* Fri May 13 2011 Kyle McMartin <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 2.6.38.6-27
- [fabbione@] Fix a deadlock when using hp_sw with an HP san.
(7a1e9d82 upstream)
* Wed May 11 2011 Chuck Ebbert <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.>
- Fix Intel IPS driver so it doesn't run continuously (#703511)
* Tue May 10 2011 Kyle McMartin <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.>
- [sgruszka@] iwlwifi: add {ack,plpc}_check module parameters (#666646)
* Tue May 10 2011 Chuck Ebbert <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.>
- Linux 2.6.38.6 (no functional changes from 2.6.38.6-26.rc1)
- Drop merged patches:
can-add-missing-socket-check-in-can_raw_release.patch
scsi-fix-oops-in-scsi_run_queue.patch
vm-skip-the-stack-guard-page-lookup-in-get_user_pages-only-for-mlock.patch
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #703011 - CVE-2011-1770 kernel: dccp: handle invalid feature
options length
https://bugzilla.redhat.com/show_bug.cgi?id=703011
[ 2 ] Bug #695976 - CVE-2011-1577 kernel: corrupted GUID partition tables can
cause kernel oops
https://bugzilla.redhat.com/show_bug.cgi?id=695976
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update kernel' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke