You are here
Home > Preporuke > Ranjivosti jezgre operacijskog sustava

Ranjivosti jezgre operacijskog sustava

  • Detalji os-a: LUB
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2748-1
September 28, 2015

linux vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in the kernel.

Software Description:
– linux: Linux kernel

Details:

Benjamin Randazzo discovered an information leak in the md (multiple
device) driver when the bitmap_info.file is disabled. A local privileged
attacker could use this to obtain sensitive information from the kernel.
(CVE-2015-5697)

Marc-Andr� Lureau discovered that the vhost driver did not properly
release the userspace provided log file descriptor. A privileged attacker
could use this to cause a denial of service (resource exhaustion).
(CVE-2015-6252)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
linux-image-3.13.0-65-generic 3.13.0-65.105
linux-image-3.13.0-65-generic-lpae 3.13.0-65.105
linux-image-3.13.0-65-lowlatency 3.13.0-65.105
linux-image-3.13.0-65-powerpc-e500 3.13.0-65.105
linux-image-3.13.0-65-powerpc-e500mc 3.13.0-65.105
linux-image-3.13.0-65-powerpc-smp 3.13.0-65.105
linux-image-3.13.0-65-powerpc64-emb 3.13.0-65.105
linux-image-3.13.0-65-powerpc64-smp 3.13.0-65.105

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References:
http://www.ubuntu.com/usn/usn-2748-1
CVE-2015-5697, CVE-2015-6252

Package Information:
https://launchpad.net/ubuntu/+source/linux/3.13.0-65.105

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=CiTb
—–END PGP SIGNATURE—–

AutorTomislav Protega
Cert idNCERT-REF-2015-09-0012-ADV
CveCVE-2015-5697 CVE-2015-6252
ID izvornikaUSN-2748-1
Proizvodlinux
Izvorhttp://www.ubuntu.com
Top
More in Preporuke
Ranjivost programskog paketa nvidia-graphics-drivers

Otkrivena je ranjivost u programskom paketu nvidia-graphics-drivers distribuiranom na operacijskim sustavima Ubuntu 12.04 LTS, 14.04 LTS i 15.04. Ranjivost je...

Close