Description: | Description: The remote host is missing an update to linux-image-2.6.24-30-386 announced via advisory USN-1323-1.
Details:
Peter Huewe discovered an information leak in the handling of reading security-related TPM data. A local, unprivileged user could read the results of a previous TPM command. (CVE-2011-1162)
Clement Lecigne discovered a bug in the HFS filesystem. A local attacker could exploit this to cause a kernel oops. (CVE-2011-2203)
A flaw was found in the b43 driver in the Linux kernel. An attacker could use this flaw to cause a denial of service if the system has an active wireless interface using the b43 driver. (CVE-2011-3359)
A flaw was found in how the Linux kernel handles user-defined key types. An unprivileged local user could exploit this to crash the system. (CVE-2011-4110)
Solution: The problem can be corrected by updating your system to the following package versions:
Ubuntu 8.04 LTS: linux-image-2.6.24-30-386 2.6.24-30.98 linux-image-2.6.24-30-generic 2.6.24-30.98 linux-image-2.6.24-30-hppa32 2.6.24-30.98 linux-image-2.6.24-30-hppa64 2.6.24-30.98 linux-image-2.6.24-30-itanium 2.6.24-30.98 linux-image-2.6.24-30-lpia 2.6.24-30.98 linux-image-2.6.24-30-lpiacompat 2.6.24-30.98 linux-image-2.6.24-30-mckinley 2.6.24-30.98 linux-image-2.6.24-30-openvz 2.6.24-30.98 linux-image-2.6.24-30-powerpc 2.6.24-30.98 linux-image-2.6.24-30-powerpc-smp 2.6.24-30.98 linux-image-2.6.24-30-powerpc64-smp 2.6.24-30.98 linux-image-2.6.24-30-rt 2.6.24-30.98 linux-image-2.6.24-30-server 2.6.24-30.98 linux-image-2.6.24-30-sparc64 2.6.24-30.98 linux-image-2.6.24-30-sparc64-smp 2.6.24-30.98 linux-image-2.6.24-30-virtual 2.6.24-30.98 linux-image-2.6.24-30-xen 2.6.24-30.98
http://www.securityspace.com/smysecure/catid.html?in=USN-1323-1
CVSS Score: 2.1
CVSS Vector: AV:L/AC:L/Au:NR/C:P/I:N/A:N
|