You are here
Home > Preporuke > Sigurnosni nedostaci u jezgri operacijskog sustava Ubuntu 12.04 LTS raring

Sigurnosni nedostaci u jezgri operacijskog sustava Ubuntu 12.04 LTS raring

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2112-1
February 18, 2014

linux-lts-raring vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in the kernel.

Software Description:
– linux-lts-raring: Linux hardware enablement kernel from Raring

Details:

Vasily Kulikov reported a flaw in the Linux kernel’s implementation of
ptrace. An unprivileged local user could exploit this flaw to obtain
sensitive information from kernel memory. (CVE-2013-2929)

Dave Jones and Vince Weaver reported a flaw in the Linux kernel’s perf
event subsystem that allows normal users to enable function tracing. An
unprivileged local user could exploit this flaw to obtain potentially
sensitive information from the kernel. (CVE-2013-2930)

A flaw in the handling of memory regions of the kernel virtual machine
(KVM) subsystem was discovered. A local user with the ability to assign a
device could exploit this flaw to cause a denial of service (memory
consumption). (CVE-2013-4592)

Nico Golde and Fabian Yamaguchi reported a flaw in the Linux kernel’s
debugfs filesystem. An administrative local user could exploit this flaw to
cause a denial of service (OOPS). (CVE-2013-6378)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
linux-image-3.8.0-36-generic 3.8.0-36.52~precise1

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References:
http://www.ubuntu.com/usn/usn-2112-1
CVE-2013-2929, CVE-2013-2930, CVE-2013-4592, CVE-2013-6378

Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-raring/3.8.0-36.52~precise1

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/
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=10BJ
—–END PGP SIGNATURE—–

AutorMarko Stanec
Cert idNCERT-REF-2014-02-0010-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci u jezgri operacijskog sustava Ubuntu 13.10 i 12.04 LTS saucy

Otkriveni su sigurnosni nedostaci u jezgri operacijskog sustava Ubuntu 13.10 i 12.04 LTS saucy. Otkriveni nedostaci potencijalnim napadačima omogućuju izvođenje...

Close