First published: Fri Jan 13 2012(Updated: )
Clement Lecigne discovered a bug in the HFS filesystem. A local attacker could exploit this to cause a kernel oops. (CVE-2011-2203) A bug was discovered in the XFS filesystem's handling of pathnames. A local attacker could exploit this to crash the system, leading to a denial of service, or gain root privileges. (CVE-2011-4077) A flaw was found in how the Linux kernel handles user-defined key types. An unprivileged local user could exploit this to crash the system. (CVE-2011-4110) A flaw was found in the Journaling Block Device (JBD). A local attacker able to mount ext3 or ext4 file systems could exploit this to crash the system, leading to a denial of service. (CVE-2011-4132) Clement Lecigne discovered a bug in the HFS file system bounds checking. When a malformed HFS file system is mounted a local user could crash the system or gain root privileges. (CVE-2011-4330) Chen Haogang discovered an integer overflow that could result in memory corruption. A local unprivileged user could use this to crash the system. (CVE-2012-0044)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.0.0-1206-omap4 | <3.0.0-1206.15 | 3.0.0-1206.15 |
Ubuntu gir1.2-packagekitglib-1.0 | =11.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
USN-1330-1 addresses vulnerabilities in the HFS and XFS filesystems that could allow local attackers to cause kernel oopses or system crashes.
The vulnerabilities in USN-1330-1 are considered to be significant as they can lead to denial of service through system crashes.
USN-1330-1 affects Ubuntu 11.10 with the specific linux-image-3.0.0-1206-omap4 package version.
To resolve the vulnerabilities in USN-1330-1, you should update to a patched version of the affected linux-image package.
Yes, local attackers could exploit the vulnerabilities in USN-1330-1 to disrupt system operation, hence it is important to apply the updates promptly.