Advisory Published

USN-1364-1: Linux kernel (OMAP4) vulnerabilities

First published: Mon Feb 13 2012(Updated: )

A bug was discovered in the Linux kernel's calculation of OOM (Out of memory) scores, that would result in the wrong process being killed. A user could use this to kill the process with the highest OOM score, even if that process belongs to another user or the system. (CVE-2011-4097) A flaw was discovered in the XFS filesystem. If a local user mounts a specially crafted XFS image it could potential execute arbitrary code on the system. (CVE-2012-0038) Andy Whitcroft discovered a that the Overlayfs filesystem was not doing the extended permission checks needed by cgroups and Linux Security Modules (LSMs). A local user could exploit this to by-pass security policy and access files that should not be accessible. (CVE-2012-0055) Jüri Aedla discovered that the kernel incorrectly handled /proc//mem permissions. A local attacker could exploit this and gain root privileges. (CVE-2012-0056) A flaw was found in the linux kernels IPv4 IGMP query processing. A remote attacker could exploit this to cause a denial of service. (CVE-2012-0207)

Affected SoftwareAffected VersionHow to fix
All of
ubuntu/linux-image-3.0.0-1207-omap4<3.0.0-1207.16
3.0.0-1207.16
Ubuntu gir1.2-packagekitglib-1.0=11.10

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Child vulnerabilities

(Contains the following vulnerabilities)

Frequently Asked Questions

  • What is the severity of USN-1364-1?

    The USN-1364-1 vulnerability has been classified as a high severity issue due to its potential to allow unauthorized process termination.

  • How do I fix USN-1364-1?

    You can fix USN-1364-1 by upgrading to the recommended kernel version 3.0.0-1207.16 or later.

  • What systems are affected by USN-1364-1?

    USN-1364-1 affects Ubuntu version 11.10 running the linux-image-3.0.0-1207-omap4 package.

  • What is the nature of the vulnerability in USN-1364-1?

    The vulnerability in USN-1364-1 is related to incorrect calculation of OOM scores that allows a user to kill processes belonging to other users.

  • Is there a workaround for USN-1364-1?

    There are no effective workarounds for USN-1364-1, so applying the security update is strongly recommended.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203