Ispravljen je sigurnosni nedostatak u jezgri operacijskog sustava Ubuntu 8.04 LTS. Lokalni, zlonamjerni korisnici ga mogu iskoristiti za izvođenje napada uskraćivanjem usluge (DoS).
Paket:
Linux kernel 2.6.x
Operacijski sustavi:
Ubuntu Linux 8.04
Kritičnost:
3.6
Problem:
pogreška u programskoj komponenti
Iskorištavanje:
lokalno
Posljedica:
uskraćivanje usluga (DoS)
Rješenje:
programska zakrpa proizvođača
CVE:
CVE-2011-4086
Izvorni ID preporuke:
USN-1454-1
Izvor:
Ubuntu
Problem:
Nedostatak je posljedica pogreške u ext4 datotečnom sustavu.
Posljedica:
Napadačima omogućuje izvođenje DoS (eng. Denial of Service) napada.
Rješenje:
Korisnicima se savjetuje instalacija ispravljene inačice.
==========================================================================
Ubuntu Security Notice USN-1454-1
May 25, 2012
linux vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 8.04 LTS
Summary:
The system could be made to crash or become unresponsive under certain
conditions.
Software Description:
- linux: Linux kernel
Details:
A flaw was found in the Linux's kernels ext4 file system when mounted with
a journal. A local, unprivileged user could exploit this flaw to cause a
denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 8.04 LTS:
linux-image-2.6.24-31-386 2.6.24-31.101
linux-image-2.6.24-31-generic 2.6.24-31.101
linux-image-2.6.24-31-hppa32 2.6.24-31.101
linux-image-2.6.24-31-hppa64 2.6.24-31.101
linux-image-2.6.24-31-itanium 2.6.24-31.101
linux-image-2.6.24-31-lpia 2.6.24-31.101
linux-image-2.6.24-31-lpiacompat 2.6.24-31.101
linux-image-2.6.24-31-mckinley 2.6.24-31.101
linux-image-2.6.24-31-openvz 2.6.24-31.101
linux-image-2.6.24-31-powerpc 2.6.24-31.101
linux-image-2.6.24-31-powerpc-smp 2.6.24-31.101
linux-image-2.6.24-31-powerpc64-smp 2.6.24-31.101
linux-image-2.6.24-31-rt 2.6.24-31.101
linux-image-2.6.24-31-server 2.6.24-31.101
linux-image-2.6.24-31-sparc64 2.6.24-31.101
linux-image-2.6.24-31-sparc64-smp 2.6.24-31.101
linux-image-2.6.24-31-virtual 2.6.24-31.101
linux-image-2.6.24-31-xen 2.6.24-31.101
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1454-1
CVE-2011-4086
Package Information:
https://launchpad.net/ubuntu/+source/linux/2.6.24-31.101
Posljednje sigurnosne preporuke