Ispravljeni su brojni propusti paketa linux-ti-omap4 za operacijski sustav Ubuntu 11.04. Spomenute nedostatke udaljeni napadač može iskoristiti za izvođenje DoS napada, a lokalni napadači za rušenje sustava te dobivanje većih privilegija.
Paket:
linux-ti-omap4
Operacijski sustavi:
Ubuntu Linux 11.04
Kritičnost:
7.2
Problem:
pogreška u programskoj komponenti
Iskorištavanje:
lokalno/udaljeno
Posljedica:
dobivanje većih privilegija, uskraćivanje usluga (DoS)
Nedostaci su posljedica pogrešaka u implementacijama NFSv4, Reliable Datagram Sockets (RDS) protokola i TUN/TAP mrežnog uređaja, hfsplus datotečnog sustava, dl2k mrežnog upravljačkog programa te komponenti fscaps (file system base capabilities).
Posljedica:
Propuste je moguće iskoristiti za izvođenje napada uskraćivanjem usluge te dobivanje root ovlasti.
Rješenje:
Svim se korisnicima, u svrhu zaštite sigurnosti, savjetuje nadogradnja na novije inačice.
==========================================================================
Ubuntu Security Notice USN-1530-1
August 10, 2012
linux-ti-omap4 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 11.04
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux-ti-omap4: Linux kernel for OMAP4
Details:
Andy Adamson discovered a flaw in the Linux kernel's NFSv4 implementation.
A remote NFS server (attacker) could exploit this flaw to cause a denial of
service. (CVE-2011-4131)
Steve Grubb reported a flaw with Linux fscaps (file system base
capabilities) when used to increase the permissions of a process. For
application on which fscaps are in use a local attacker can disable address
space randomization to make attacking the process with raised privileges
easier. (CVE-2012-2123)
An error was discovered in the Linux kernel's network TUN/TAP device
implementation. A local user with access to the TUN/TAP interface (which is
not available to unprivileged users until granted by a root user) could
exploit this flaw to crash the system or potential gain administrative
privileges. (CVE-2012-2136)
Stephan Mueller reported a flaw in the Linux kernel's dl2k network driver's
handling of ioctls. An unprivileged local user could leverage this flaw to
cause a denial of service. (CVE-2012-2313)
Timo Warns reported multiple flaws in the Linux kernel's hfsplus
filesystem. An unprivileged local user could exploit these flaws to gain
root system priviliges. (CVE-2012-2319)
A flaw was found in the Linux kernel's Reliable Datagram Sockets (RDS)
protocol implementation. A local, unprivileged user could use this flaw to
cause a denial of service. (CVE-2012-2372)
A flaw was discovered in the Linux kernel's NFSv4 (Network file system)
handling of ACLs (access control lists). A remote NFS server (attacker)
could cause a denial of service (OOPS). (CVE-2012-2375)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 11.04:
linux-image-2.6.38-1209-omap4 2.6.38-1209.25
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1530-1
CVE-2011-4131, CVE-2012-2123, CVE-2012-2136, CVE-2012-2313,
CVE-2012-2319, CVE-2012-2372, CVE-2012-2375
Package Information:
https://launchpad.net/ubuntu/+source/linux-ti-omap4/2.6.38-1209.25
Posljednje sigurnosne preporuke