U radu jezgre operacijskog sustava Ubuntu 10.04 LTS otkrivena su i ispravljena tri nedostatka koje su zloćudni korisnici mogli iskoristiti za zadobivanje većih ovlasti i DoS napad.
Paket:
linux-lts-backport-natty
Operacijski sustavi:
Ubuntu Linux 10.04, Ubuntu Linux 11.04
Kritičnost:
7.2
Problem:
pogreška u programskoj komponenti
Iskorištavanje:
lokalno
Posljedica:
dobivanje većih privilegija, uskraćivanje usluga (DoS)
Rješenje:
programska zakrpa proizvođača
CVE:
CVE-2012-2313, CVE-2012-2319, CVE-2012-2375
Izvorni ID preporuke:
USN-1490-1
Izvor:
Ubuntu
Problem:
Ranjivosti su povezane s greškama u upravljačkom programu dl2k, datotečnom sustavu hfsplus i komponenti NFSv4 (eng. Network file system).
Posljedica:
Lokalni napadač može navedene nedostatke iskoristiti za dobivanje root ovlasti te napad uskraćivanjem usluga (eng. Denial of Service, DoS).
Rješenje:
Svim korisnicima se savjetuje instalacija nove, ispravljene inačice.
==========================================================================
Ubuntu Security Notice USN-1490-1
June 29, 2012
linux-lts-backport-natty vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux-lts-backport-natty: Linux kernel backport from Natty
Details:
Stephan Mueller reported a flaw in the Linux kernel's dl2k network driver's
handling of ioctls. An unprivileged local user could leverage this flaw to
cause a denial of service. (CVE-2012-2313)
Timo Warns reported multiple flaws in the Linux kernel's hfsplus
filesystem. An unprivileged local user could exploit these flaws to gain
root system priviliges. (CVE-2012-2319)
A flaw was discovered in the Linux kernel's NFSv4 (Network file system)
handling of ACLs (access control lists). A remote NFS server (attacker)
could cause a denial of service (OOPS). (CVE-2012-2375)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 10.04 LTS:
linux-image-2.6.38-15-generic 2.6.38-15.61~lucid1
linux-image-2.6.38-15-generic-pae 2.6.38-15.61~lucid1
linux-image-2.6.38-15-server 2.6.38-15.61~lucid1
linux-image-2.6.38-15-virtual 2.6.38-15.61~lucid1
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1490-1
CVE-2012-2313, CVE-2012-2319, CVE-2012-2375
Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-backport-natty/2.6.38-15.61~lucid1
==========================================================================
Ubuntu Security Notice USN-1488-1
June 29, 2012
linux vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 11.04
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux: Linux kernel
Details:
Stephan Mueller reported a flaw in the Linux kernel's dl2k network driver's
handling of ioctls. An unprivileged local user could leverage this flaw to
cause a denial of service. (CVE-2012-2313)
Timo Warns reported multiple flaws in the Linux kernel's hfsplus
filesystem. An unprivileged local user could exploit these flaws to gain
root system priviliges. (CVE-2012-2319)
A flaw was discovered in the Linux kernel's NFSv4 (Network file system)
handling of ACLs (access control lists). A remote NFS server (attacker)
could cause a denial of service (OOPS). (CVE-2012-2375)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 11.04:
linux-image-2.6.38-15-generic 2.6.38-15.61
linux-image-2.6.38-15-generic-pae 2.6.38-15.61
linux-image-2.6.38-15-omap 2.6.38-15.61
linux-image-2.6.38-15-powerpc 2.6.38-15.61
linux-image-2.6.38-15-powerpc-smp 2.6.38-15.61
linux-image-2.6.38-15-powerpc64-smp 2.6.38-15.61
linux-image-2.6.38-15-server 2.6.38-15.61
linux-image-2.6.38-15-versatile 2.6.38-15.61
linux-image-2.6.38-15-virtual 2.6.38-15.61
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1488-1
CVE-2012-2313, CVE-2012-2319, CVE-2012-2375
Package Information:
https://launchpad.net/ubuntu/+source/linux/2.6.38-15.61
Posljednje sigurnosne preporuke