First published: Mon Feb 13 2012(Updated: )
A bug was discovered in the Linux kernel's calculation of OOM (Out of memory) scores, that would result in the wrong process being killed. A user could use this to kill the process with the highest OOM score, even if that process belongs to another user or the system. (CVE-2011-4097) A flaw was discovered in the XFS filesystem. If a local user mounts a specially crafted XFS image it could potential execute arbitrary code on the system. (CVE-2012-0038) Andy Whitcroft discovered a that the Overlayfs filesystem was not doing the extended permission checks needed by cgroups and Linux Security Modules (LSMs). A local user could exploit this to by-pass security policy and access files that should not be accessible. (CVE-2012-0055) Jüri Aedla discovered that the kernel incorrectly handled /proc//mem permissions. A local attacker could exploit this and gain root privileges. (CVE-2012-0056) A flaw was found in the linux kernels IPv4 IGMP query processing. A remote attacker could exploit this to cause a denial of service. (CVE-2012-0207)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.0.0-1207-omap4 | <3.0.0-1207.16 | 3.0.0-1207.16 |
Ubuntu gir1.2-packagekitglib-1.0 | =11.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The USN-1364-1 vulnerability has been classified as a high severity issue due to its potential to allow unauthorized process termination.
You can fix USN-1364-1 by upgrading to the recommended kernel version 3.0.0-1207.16 or later.
USN-1364-1 affects Ubuntu version 11.10 running the linux-image-3.0.0-1207-omap4 package.
The vulnerability in USN-1364-1 is related to incorrect calculation of OOM scores that allows a user to kill processes belonging to other users.
There are no effective workarounds for USN-1364-1, so applying the security update is strongly recommended.