U radu jezgre operacijskog sustava Ubuntu 10.04 LTS uočeno je nekoliko ranjivosti koje zloćudni korisnici mogu iskoristiti za DoS napad te stjecanje ovlasti za izvršavanje proizvoljnog programskog koda.
Paket:
Linux kernel 2.6.x
Operacijski sustavi:
Ubuntu Linux 10.04
Kritičnost:
5.2
Problem:
neodgovarajuće rukovanje datotekama, pogreška u programskoj komponenti
Iskorištavanje:
udaljeno
Posljedica:
dobivanje većih privilegija, proizvoljno izvršavanje programskog koda, uskraćivanje usluga (DoS)
Rješenje:
programska zakrpa proizvođača
CVE:
CVE-2011-4086, CVE-2012-1601, CVE-2012-2123
Izvorni ID preporuke:
USN-1445-1
Izvor:
Ubuntu
Problem:
Sigurnosni propusti uzrokovani su nepravilnostima u implementaciji ext4 datotečnog sustava te KVM (Kernel virtual Machine) stroja.
Posljedica:
Zlonamjerni korisnik bi mogao iskoristiti propuste za izvršavanje DoS napada te pokrenuti proizvoljni programski kod s povećanim privilegijama.
Rješenje:
Svim se korisnicima savjetuje instalacija nadogradnje.
==========================================================================
Ubuntu Security Notice USN-1445-1
May 18, 2012
linux vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux: Linux kernel
Details:
A flaw was found in the Linux's kernels ext4 file system when mounted with
a journal. A local, unprivileged user could exploit this flaw to cause a
denial of service. (CVE-2011-4086)
A flaw was found in the Linux kernel's KVM (Kernel Virtual Machine) virtual
cpu setup. An unprivileged local user could exploit this flaw to crash the
system leading to a denial of service. (CVE-2012-1601)
Steve Grubb reported a flaw with Linux fscaps (file system base
capabilities) when used to increase the permissions of a process. For
application on which fscaps are in use a local attacker can disable address
space randomization to make attacking the process with raised privileges
easier. (CVE-2012-2123)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 10.04 LTS:
linux-image-2.6.32-41-386 2.6.32-41.89
linux-image-2.6.32-41-generic 2.6.32-41.89
linux-image-2.6.32-41-generic-pae 2.6.32-41.89
linux-image-2.6.32-41-ia64 2.6.32-41.89
linux-image-2.6.32-41-lpia 2.6.32-41.89
linux-image-2.6.32-41-powerpc 2.6.32-41.89
linux-image-2.6.32-41-powerpc-smp 2.6.32-41.89
linux-image-2.6.32-41-powerpc64-smp 2.6.32-41.89
linux-image-2.6.32-41-preempt 2.6.32-41.89
linux-image-2.6.32-41-server 2.6.32-41.89
linux-image-2.6.32-41-sparc64 2.6.32-41.89
linux-image-2.6.32-41-sparc64-smp 2.6.32-41.89
linux-image-2.6.32-41-versatile 2.6.32-41.89
linux-image-2.6.32-41-virtual 2.6.32-41.89
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1445-1
CVE-2011-4086, CVE-2012-1601, CVE-2012-2123
Package Information:
https://launchpad.net/ubuntu/+source/linux/2.6.32-41.89
Posljednje sigurnosne preporuke