Description: | Description: The remote host is missing an update to linux-image-3.2.0-29-generic announced via advisory USN-1529-1.
Details:
A flaw was discovered in the Linux kernel's macvtap device driver, which is used in KVM (Kernel-based Virtual Machine) to create a network bridge between host and guest. A privleged user in a guest could exploit this flaw to crash the host, if the vhost_net module is loaded with the experimental_zcopytx option enabled. (CVE-2012-2119)
An error was discovered in the Linux kernel's network TUN/TAP device implementation. A local user with access to the TUN/TAP interface (which is not available to unprivileged users until granted by a root user) could exploit this flaw to crash the system or potential gain administrative privileges. (CVE-2012-2136)
A flaw was found in how the Linux kernel's KVM (Kernel-based Virtual Machine) subsystem handled MSI (Message Signaled Interrupts). A local unprivileged user could exploit this flaw to cause a denial of service or potentially elevate privileges. (CVE-2012-2137)
A flaw was found in the Linux kernel's Reliable Datagram Sockets (RDS) protocol implementation. A local, unprivileged user could use this flaw to cause a denial of service. (CVE-2012-2372)
Ulrich Obergfell discovered an error in the Linux kernel's memory management subsystem on 32 bit PAE systems with more than 4GB of memory installed. A local unprivileged user could exploit this flaw to crash the system. (CVE-2012-2373)
Dan Rosenberg discovered flaws in the Linux kernel's NCI (Near Field Communication Controller Interface). A remote attacker could exploit these flaws to crash the system or potentially execute privileged code. (CVE-2012-3364)
A flaw was discovered in the Linux kernel's epoll system call. An unprivileged local user could use this flaw to crash the system. (CVE-2012-3375)
Some errors where discovered in the Linux kernel's UDF file system, which is used to mount some CD-ROMs and DVDs. An unprivileged local user could use these flaws to crash the system. (CVE-2012-3400)
Solution: The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04 LTS: linux-image-3.2.0-29-generic 3.2.0-29.46 linux-image-3.2.0-29-generic-pae 3.2.0-29.46 linux-image-3.2.0-29-highbank 3.2.0-29.46 linux-image-3.2.0-29-omap 3.2.0-29.46 linux-image-3.2.0-29-powerpc-smp 3.2.0-29.46 linux-image-3.2.0-29-powerpc64-smp 3.2.0-29.46 linux-image-3.2.0-29-virtual 3.2.0-29.46
http://www.securityspace.com/smysecure/catid.html?in=USN-1529-1
CVSS Score: 7.2
CVSS Vector: AV:L/AC:L/Au:NR/C:C/I:C/A:C
|