Welcome 微信登录
编程资源 图片资源库 蚂蚁家优选 PDF转换器

首页 / 操作系统 / Linux / [注意]Ubuntu发现影响所有版本内核安全漏洞

11月27日,Ubuntu开发者为6.06 LTS, 7.10, 8.04 LTS以及8.10这几个版本发布了重要安全更新,补丁修复了9个内核安全安全问题,因此强烈建议Ubuntu用户尽快升级自己的系统. 内核安全漏洞列表 1. The Xen hypervisor block driver couldn"t accurately validate incoming requests. Therefore, a user with root privileges could crash a system and cause a DoS (Denial of Service) attack by executing malicious I/O requests. This issue affects only Ubuntu 7.10. 2. The i915 video driver couldn"t accurately validate memory addresses. Therefore, an attacker could remap memory and cause a system crash, leading to a DoS (Denial of Service) attack. Ubuntu 6.06 LTS, 7.10 and 8.04 LTS users are not affected by this issue. Ubuntu 8.10 users should update their systems to correct this vulnerability! 3. When files were created in the setgid directories, the Linux kernel package couldn"t accurately strip permissions. Because of this, a local user could gain extra group privileges. This issue was discovered by David Watson and it affects only Ubuntu 6.06 LTS users! 4. When file splice requests were handled, the Linux kernel package couldn"t accurately reject the "append" flag. Therefore, a local attacker could create changes to random locations in a file by bypassing the append mode. This issue was discovered by Olaf Kirch and Miklos Szeredi, and affects only Ubuntu 7.10 and 8.04 LTS users! 5. The SCTP stack couldn"t accurately handle INIT-ACK. Because of this, a remote user could send specially crafted SCTP traffic and crash the system, leading to a DoS (Denial of Service) attack. This issue affects only Ubuntu 8.10 users! 6. The SCTP stack couldn"t accurately handle the length of bad packets. Because of this, a remote user could send specially crafted SCTP traffic and crash the system, leading to a DoS (Denial of Service) attack. This issue affects only Ubuntu 8.10 users! 7. The HFS+ filesystem had several flaws. Because of this, a user could be tricked to mount a malicious HFS+ filesystem, which could lead to a DoS (Denial of Service) attack and crash the system. This issue was discovered by Eric Sesterhenn, and affects all Ubuntu users! 8. The Unix Socket handler couldn"t accurately process the SCM_RIGHTS message. Therefore, a local attacker could create a malicious socket request and crash the system, leading to a DoS (Denial of Service) attack. This issue affects all Ubuntu users! 9. The i2c audio driver couldn"t accurately validate several function pointers. Therefore, a local users could obtain root privileges and crash the system, leading to a DoS (Denial of Service) attack. This issue affects all Ubuntu users! Ubuntu 6.06 LTS 要将内核升级到linux-image-2.6.15-53.74Ubuntu 7.10 要将内核升级到  linux-image-2.6.22-16.60Ubuntu 8.04 LTS 要将内核升级到 LTS linux-image-2.6.24-22.45Ubuntu 8.10 要将内核升级到 linux-image-2.6.27-9.19Linux系统各版本本地root密码破解方法整理Linux下查找系统漏洞的两类常用工具相关资讯      Linux安全  ubuntu安全 
  • 发现针对 Linux 服务器和代码库的  (11/08/2015 09:11:50)
  • Linux安全与优化  (12/05/2014 17:04:31)
  • 加强 Linux 桌面安全  (08/15/2014 11:36:10)
  • 牢记这七点 让你的Linux服务器变得  (08/12/2015 15:39:07)
  • 树大招风,Linux的安全威胁正在不  (08/24/2014 21:44:47)
  • GNU/Linux安全基线与加固  (07/22/2014 13:51:21)
本文评论 查看全部评论 (0)
表情: 姓名: 字数


评论声明
  • 尊重网上道德,遵守中华人民共和国的各项有关法律法规
  • 承担一切因您的行为而直接或间接导致的民事或刑事法律责任
  • 本站管理人员有权保留或删除其管辖留言中的任意内容
  • 本站有权在网站内转载或引用您的评论
  • 参与本评论即表明您已经阅读并接受上述条款