You are here
Home > Preporuke > Ranjivosti jezgre operacijskog sustava

Ranjivosti jezgre operacijskog sustava

  • Detalji os-a: LUB
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2285-1
July 17, 2014

linux-lts-quantal vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in the kernel.

Software Description:
– linux-lts-quantal: Linux hardware enablement kernel from Quantal

Details:

Sasha Levin reported a flaw in the Linux kernel’s point-to-point protocol
(PPP) when used with the Layer Two Tunneling Protocol (L2TP). A local user
could exploit this flaw to gain administrative privileges. (CVE-2014-4943)

Michael S. Tsirkin discovered an information leak in the Linux kernel’s
segmentation of skbs when using the zerocopy feature of vhost-net. A local
attacker could exploit this flaw to gain potentially sensitive information
from kernel memory. (CVE-2014-0131)

Salva Peiró discovered an information leak in the Linux kernel’s media-
device driver. A local attacker could exploit this flaw to obtain sensitive
information from kernel memory. (CVE-2014-1739)

A flaw was discovered in the Linux kernel’s audit subsystem when auditing
certain syscalls. A local attacker could exploit this flaw to obtain
potentially sensitive single-bit values from kernel memory or cause a
denial of service (OOPS). (CVE-2014-3917)

A flaw was discovered in the Linux kernel’s implementation of user
namespaces with respect to inode permissions. A local user could exploit
this flaw by creating a user namespace to gain administrative privileges.
(CVE-2014-4014)

An information leak was discovered in the rd_mcp backend of the iSCSI
target subsystem in the Linux kernel. A local user could exploit this flaw
to obtain sensitive information from ramdisk_mcp memory by leveraging
access to a SCSI initiator. (CVE-2014-4027)

Don Bailey discovered a flaw in the LZO decompress algorithm used by the
Linux kernel. An attacker could exploit this flaw to cause a denial of
service (memory corruption or OOPS). (CVE-2014-4608)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
linux-image-3.5.0-54-generic 3.5.0-54.81~precise1

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References:
http://www.ubuntu.com/usn/usn-2285-1
CVE-2014-0131, CVE-2014-1739, CVE-2014-3917, CVE-2014-4014,
CVE-2014-4027, CVE-2014-4608, CVE-2014-4943

Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-quantal/3.5.0-54.81~precise1

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=9AMY
—–END PGP SIGNATURE—–

AutorTomislav Protega
Cert idNCERT-REF-2014-07-0017-ADV
CveCVE-2014-4943 CVE-2014-0131 CVE-2014-1739 CVE-2014-3917 CVE-2014-4014 CVE-2014-4027 CVE-2014-4608
ID izvornikaUSN-2285-1
Proizvodlinux-lts-quantal
Izvorhttp://www.ubuntu.com
Top
More in Preporuke
Ranjivosti jezgre operacijskog sustava

Izdana je nadogradnja za otklanjanje ranjivosti u verzijama jezgri linux-lts-trusty za Ubuntu 12.04 LTS te linux za Ubuntu 14.04 LTS....

Close