U radu jezgre operacijskog sustava Ubuntu 10.04 LTS otkrivena su tri sigurnosna propusta koje lokalni napadač može iskoristiti za DoS napad, dobivanje većih ovlasti i zaobilaženje postavljenih ograničenja.
Paket:
linux-ec2
Operacijski sustavi:
Ubuntu Linux 10.04
Kritičnost:
5.3
Problem:
pogreška u programskoj funkciji, pogreška u programskoj komponenti
Iskorištavanje:
lokalno
Posljedica:
dobivanje većih privilegija, uskraćivanje usluga (DoS), zaobilaženje postavljenih ograničenja
Rješenje:
programska zakrpa proizvođača
CVE:
CVE-2011-4086, CVE-2012-1601, CVE-2012-2123
Izvorni ID preporuke:
USN-1453-1
Izvor:
Ubuntu
Problem:
Spomenuti su propusti uzrokovani nepravilnostima u ext4 datotečnom sustavu i KVM implementaciji, te pogreškom u funkciji "cap_bprm_set_creds".
Posljedica:
Napadačima omogućuju dobivanje većih ovlasti, zaobilaženje određenih sigurnosnih ograničenja i izvođenje napada uskraćivanjem usluge.
Rješenje:
Svim se korisnicima preporuča instalacija odgovarajućih zakrpa.
==========================================================================
Ubuntu Security Notice USN-1453-1
May 25, 2012
linux-ec2 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux-ec2: Linux kernel for EC2
Details:
A flaw was found in the Linux's kernels ext4 file system when mounted with
a journal. A local, unprivileged user could exploit this flaw to cause a
denial of service. (CVE-2011-4086)
A flaw was found in the Linux kernel's KVM (Kernel Virtual Machine) virtual
cpu setup. An unprivileged local user could exploit this flaw to crash the
system leading to a denial of service. (CVE-2012-1601)
Steve Grubb reported a flaw with Linux fscaps (file system base
capabilities) when used to increase the permissions of a process. For
application on which fscaps are in use a local attacker can disable address
space randomization to make attacking the process with raised privileges
easier. (CVE-2012-2123)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 10.04 LTS:
linux-image-2.6.32-345-ec2 2.6.32-345.48
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1453-1
CVE-2011-4086, CVE-2012-1601, CVE-2012-2123
Package Information:
https://launchpad.net/ubuntu/+source/linux-ec2/2.6.32-345.48
Posljednje sigurnosne preporuke