Description: | Description: The remote host is missing an update to linux-image-3.0.0-16-generic announced via advisory USN-1405-1.
Details:
Somnath Kotur discovered an error in the Linux kernel's VLAN (virtual lan) and be2net drivers. An attacker on the local network could exploit this flaw to cause a denial of service. (CVE-2011-3347)
Paolo Bonzini discovered a flaw in Linux's handling of the SG_IO ioctl command. A local user, or user in a VM could exploit this flaw to bypass restrictions and gain read/write access to all data on the affected block device. (CVE-2011-4127)
Sasha Levin discovered a flaw in the permission checking for device assignments requested via the kvm ioctl in the Linux kernel. A local user could use this flaw to crash the system causing a denial of service. (CVE-2011-4347)
Stephan B??rwolf discovered a flaw in the KVM (kernel-based virtual machine) subsystem of the Linux kernel. A local unprivileged user can crash use this flaw to crash VMs causing a deny of service. (CVE-2012-0045)
A flaw was discovered in the Linux kernel's cifs file system. An unprivileged local user could exploit this flaw to crash the system leading to a denial of service. (CVE-2012-1090)
H. Peter Anvin reported a flaw in the Linux kernel that could crash the system. A local user could exploit this flaw to crash the system. (CVE-2012-1097)
A flaw was discovered in the Linux kernel's cgroups subset. A local attacker could use this flaw to crash the system. (CVE-2012-1146)
Solution: The problem can be corrected by updating your system to the following package versions:
Ubuntu 11.10: linux-image-3.0.0-16-generic 3.0.0-16.29 linux-image-3.0.0-16-generic-pae 3.0.0-16.29 linux-image-3.0.0-16-omap 3.0.0-16.29 linux-image-3.0.0-16-powerpc 3.0.0-16.29 linux-image-3.0.0-16-powerpc-smp 3.0.0-16.29 linux-image-3.0.0-16-powerpc64-smp 3.0.0-16.29 linux-image-3.0.0-16-server 3.0.0-16.29 linux-image-3.0.0-16-virtual 3.0.0-16.29
http://www.securityspace.com/smysecure/catid.html?in=USN-1405-1
CVSS Score: 10.0
CVSS Vector: AV:L/AC:L/Au:NR/C:C/I:C/A:C
|