Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.71717
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-1386-1 (linux-image-2.6.38-13-generic)
Summary:NOSUMMARY
Description:Description:
The remote host is missing an update to linux-image-2.6.38-13-generic
announced via advisory USN-1386-1.

Details:

The linux kernel did not properly account for PTE pages when deciding which
task to kill in out of memory conditions. A local, unprivileged could
exploit this flaw to cause a denial of service. (CVE-2011-2498)

A flaw was discovered in the TOMOYO LSM's handling of mount system calls.
An unprivileged user could oops the system causing a denial of service.
(CVE-2011-2518)

Han-Wen Nienhuys reported a flaw in the FUSE kernel module. A local user
who can mount a FUSE file system could cause a denial of service.
(CVE-2011-3353)

A bug was discovered in the Linux kernel's calculation of OOM (Out of
memory) scores, that would result in the wrong process being killed. A user
could use this to kill the process with the highest OOM score, even if that
process belongs to another user or the system. (CVE-2011-4097)

A flaw was found in KVM's Programmable Interval Timer (PIT). When a virtual
interrupt control is not available a local user could use this to cause a
denial of service by starting a timer. (CVE-2011-4622)

A flaw was discovered in the XFS filesystem. If a local user mounts a
specially crafted XFS image it could potential execute arbitrary code on
the system. (CVE-2012-0038)

Chen Haogang discovered an integer overflow that could result in memory
corruption. A local unprivileged user could use this to crash the system.
(CVE-2012-0044)

A flaw was found in the linux kernels IPv4 IGMP query processing. A remote
attacker could exploit this to cause a denial of service. (CVE-2012-0207)

Solution:
The problem can be corrected by updating your system to the following
package versions:

Ubuntu 10.04 LTS:
linux-image-2.6.38-13-generic 2.6.38-13.56~
lucid1
linux-image-2.6.38-13-generic-pae 2.6.38-13.56~
lucid1
linux-image-2.6.38-13-server 2.6.38-13.56~
lucid1
linux-image-2.6.38-13-virtual 2.6.38-13.56~
lucid1

http://www.securityspace.com/smysecure/catid.html?in=USN-1386-1

CVSS Score:
7.8

CVSS Vector:
AV:L/AC:L/Au:NR/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-2498
http://marc.info/?l=oss-security&m=130923704824984&w=2
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-2498.html
https://security-tracker.debian.org/tracker/CVE-2011-2498
https://usn.ubuntu.com/1167-1/
https://www.rapid7.com/db/vulnerabilities/ubuntu-USN-1383-1
Common Vulnerability Exposure (CVE) ID: CVE-2011-2518
HPSBGN02970
http://marc.info/?l=bugtraq&m=139447903326211&w=2
[oss-security] 20110701 Re: CVE request: kernel: tomoyo: oops in tomoyo_mount_acl()
http://www.openwall.com/lists/oss-security/2011/07/01/5
http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39.2
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4e78c724d47e2342aa8fde61f6b8536f662f795f
https://github.com/torvalds/linux/commit/4e78c724d47e2342aa8fde61f6b8536f662f795f
Common Vulnerability Exposure (CVE) ID: CVE-2011-3353
[oss-security] 20110909 Re: CVE request -- kernel: fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
http://www.openwall.com/lists/oss-security/2011/09/09/6
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1
https://bugzilla.redhat.com/show_bug.cgi?id=736761
https://github.com/torvalds/linux/commit/c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae
Common Vulnerability Exposure (CVE) ID: CVE-2011-4097
[oss-security] 20111031 Re: CVE request: kernel: oom: fix integer overflow of points in oom_badness
http://www.openwall.com/lists/oss-security/2011/11/01/2
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1.8
https://bugzilla.redhat.com/show_bug.cgi?id=750399
https://github.com/torvalds/linux/commit/56c6a8a4aadca809e04276eabe5552935c51387f
Common Vulnerability Exposure (CVE) ID: CVE-2011-4622
1026559
http://www.securitytracker.com/id?1026559
51172
http://www.securityfocus.com/bid/51172
RHSA-2012:0051
http://www.redhat.com/support/errata/RHSA-2012-0051.html
SUSE-SU-2012:0616
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html
[kvm] 20111214 [PATCH 1/2] KVM: x86: Prevent starting PIT timers in the absence of irqchip support
http://permalink.gmane.org/gmane.comp.emulators.kvm.devel/83564
[oss-security] 20111221 Re: kernel: kvm: pit timer with no irqchip crashes the system
http://www.openwall.com/lists/oss-security/2011/12/21/7
https://bugzilla.redhat.com/show_bug.cgi?id=769721
openSUSE-SU-2013:0925
http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html
Common Vulnerability Exposure (CVE) ID: CVE-2012-0038
[oss-security] 20120110 Re: CVE request: kernel: xfs heap overflow
http://www.openwall.com/lists/oss-security/2012/01/10/11
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=093019cf1b18dd31b2c3b77acce4e000e2cbc9ce
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1.9
https://bugzilla.redhat.com/show_bug.cgi?id=773280
https://github.com/torvalds/linux/commit/093019cf1b18dd31b2c3b77acce4e000e2cbc9ce
https://github.com/torvalds/linux/commit/fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba
Common Vulnerability Exposure (CVE) ID: CVE-2012-0044
51371
http://www.securityfocus.com/bid/51371
RHSA-2012:0743
http://rhn.redhat.com/errata/RHSA-2012-0743.html
USN-1555-1
http://www.ubuntu.com/usn/USN-1555-1
USN-1556-1
http://www.ubuntu.com/usn/USN-1556-1
[oss-security] 20120111 Re: CVE request - kernel: drm: integer overflow in drm_mode_dirtyfb_ioctl()
http://www.openwall.com/lists/oss-security/2012/01/12/1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a5cd335165e31db9dbab636fd29895d41da55dd2
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1.5
https://bugzilla.redhat.com/show_bug.cgi?id=772894
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
Common Vulnerability Exposure (CVE) ID: CVE-2012-0207
http://www.openwall.com/lists/oss-security/2012/01/10/5
CopyrightCopyright (c) 2012 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.