频道栏目
首页 > 资讯 > 安全公告 > 正文

Ubuntu发现影响所有版本内核安全漏洞

08-12-01        来源:[db:作者]  
收藏   我要投稿

11月27日,Ubuntu开发者为6.06 LTS, 7.10, 8.04 LTS以及8.10这几个版本发布了重要安全更新,补丁修复了9个内核安全安全问题,因此强烈建议Ubuntu用户尽快升级自己的系统.


内核安全漏洞列表

1. The Xen hypervisor block driver couldnt accurately validate incoming requests. Therefore, a user with root privileges could crash a system and cause a DoS (Denial of Service) attack by executing malicious I/O requests. This issue affects only Ubuntu 7.10.

2. The i915 video driver couldnt accurately validate memory addresses. Therefore, an attacker could remap memory and cause a system crash, leading to a DoS (Denial of Service) attack. Ubuntu 6.06 LTS, 7.10 and 8.04 LTS users are not affected by this issue. Ubuntu 8.10 users should update their systems to correct this vulnerability!

3. When files were created in the setgid directories, the Linux kernel package couldnt accurately strip permissions. Because of this, a local user could gain extra group privileges. This issue was discovered by David Watson and it affects only Ubuntu 6.06 LTS users!

4. When file splice requests were handled, the Linux kernel package couldnt accurately reject the "append" flag. Therefore, a local attacker could create changes to random locations in a file by bypassing the append mode. This issue was discovered by Olaf Kirch and Miklos Szeredi, and affects only Ubuntu 7.10 and 8.04 LTS users!

5. The SCTP stack couldnt accurately handle INIT-ACK. Because of this, a remote user could send specially crafted SCTP traffic and crash the system, leading to a DoS (Denial of Service) attack. This issue affects only Ubuntu 8.10 users!

6. The SCTP stack couldnt accurately handle the length of bad packets. Because of this, a remote user could send specially crafted SCTP traffic and crash the system, leading to a DoS (Denial of Service) attack. This issue affects only Ubuntu 8.10 users!

7. The HFS+ filesystem had several flaws. Because of this, a user could be tricked to mount a malicious HFS+ filesystem, which could lead to a DoS (Denial of Service) attack and crash the system. This issue was discovered by Eric Sesterhenn, and affects all Ubuntu users!

8. The Unix Socket handler couldnt accurately process the SCM_RIGHTS message. Therefore, a local attacker could create a malicious socket request and crash the system, leading to a DoS (Denial of Service) attack. This issue affects all Ubuntu users!

9. The i2c audio driver couldnt accurately validate several function pointers. Therefore, a local users could obtain root privileges and crash the system, leading to a DoS (Denial of Service) attack. This issue affects all Ubuntu users!

Ubuntu 6.06 LTS 要将内核升级到linux-image-2.6.15-53.74
Ubuntu 7.10 要将内核升级到 linux-image-2.6.22-16.60
Ubuntu 8.04 LTS 要将内核升级到 LTS linux-image-2.6.24-22.45
Ubuntu 8.10 要将内核升级到 linux-image-2.6.27-9.19

相关TAG标签
上一篇:讨论net.exe和net1.exe的关系
下一篇:JSON Hijacking的利用以及Web API安全
相关文章
图文推荐

关于我们 | 联系我们 | 广告服务 | 投资合作 | 版权申明 | 在线帮助 | 网站地图 | 作品发布 | Vip技术培训 | 举报中心

版权所有: 红黑联盟--致力于做实用的IT技术学习网站