Description: | Description: The remote host is missing an update to linux-image-3.0.0-1214-omap4 announced via advisory USN-1532-1.
Details:
An error was discovered in the Linux kernel's network TUN/TAP device implementation. A local user with access to the TUN/TAP interface (which is not available to unprivileged users until granted by a root user) could exploit this flaw to crash the system or potential gain administrative privileges. (CVE-2012-2136)
Ulrich Obergfell discovered an error in the Linux kernel's memory management subsystem on 32 bit PAE systems with more than 4GB of memory installed. A local unprivileged user could exploit this flaw to crash the system. (CVE-2012-2373)
A flaw was discovered in the Linux kernel's epoll system call. An unprivileged local user could use this flaw to crash the system. (CVE-2012-3375)
Some errors where discovered in the Linux kernel's UDF file system, which is used to mount some CD-ROMs and DVDs. An unprivileged local user could use these flaws to crash the system. (CVE-2012-3400)
Solution: The problem can be corrected by updating your system to the following package versions:
Ubuntu 11.10: linux-image-3.0.0-1214-omap4 3.0.0-1214.26
http://www.securityspace.com/smysecure/catid.html?in=USN-1532-1
CVSS Score: 7.2
CVSS Vector: AV:L/AC:L/Au:NR/C:C/I:C/A:C
|