Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.840951
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-1364-1)
Summary:The remote host is missing an update for the 'linux-ti-omap4' package(s) announced via the USN-1364-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux-ti-omap4' package(s) announced via the USN-1364-1 advisory.

Vulnerability Insight:
A bug was discovered in the Linux kernel's calculation of OOM (Out of
memory) scores, that would result in the wrong process being killed. A user
could use this to kill the process with the highest OOM score, even if that
process belongs to another user or the system. (CVE-2011-4097)

A flaw was discovered in the XFS filesystem. If a local user mounts a
specially crafted XFS image it could potential execute arbitrary code on
the system. (CVE-2012-0038)

Andy Whitcroft discovered a that the Overlayfs filesystem was not doing the
extended permission checks needed by cgroups and Linux Security Modules
(LSMs). A local user could exploit this to by-pass security policy and
access files that should not be accessible. (CVE-2012-0055)

Juri Aedla discovered that the kernel incorrectly handled /proc//mem
permissions. A local attacker could exploit this and gain root privileges.
(CVE-2012-0056)

A flaw was found in the linux kernels IPv4 IGMP query processing. A remote
attacker could exploit this to cause a denial of service. (CVE-2012-0207)

Affected Software/OS:
'linux-ti-omap4' package(s) on Ubuntu 11.10.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-4097
[oss-security] 20111031 Re: CVE request: kernel: oom: fix integer overflow of points in oom_badness
http://www.openwall.com/lists/oss-security/2011/11/01/2
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1.8
https://bugzilla.redhat.com/show_bug.cgi?id=750399
https://github.com/torvalds/linux/commit/56c6a8a4aadca809e04276eabe5552935c51387f
Common Vulnerability Exposure (CVE) ID: CVE-2012-0038
[oss-security] 20120110 Re: CVE request: kernel: xfs heap overflow
http://www.openwall.com/lists/oss-security/2012/01/10/11
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=093019cf1b18dd31b2c3b77acce4e000e2cbc9ce
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1.9
https://bugzilla.redhat.com/show_bug.cgi?id=773280
https://github.com/torvalds/linux/commit/093019cf1b18dd31b2c3b77acce4e000e2cbc9ce
https://github.com/torvalds/linux/commit/fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba
Common Vulnerability Exposure (CVE) ID: CVE-2012-0055
[oss-security] 20120117 Re: CVE Request: overlayfs
http://www.openwall.com/lists/oss-security/2012/01/17/11
http://www.ubuntu.com/usn/USN-1363-1
http://www.ubuntu.com/usn/USN-1364-1
http://www.ubuntu.com/usn/USN-1384-1
https://access.redhat.com/security/cve/cve-2012-0055
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/915941
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-0055
Common Vulnerability Exposure (CVE) ID: CVE-2012-0056
47708
http://secunia.com/advisories/47708
51625
http://www.securityfocus.com/bid/51625
RHSA-2012:0052
http://www.redhat.com/support/errata/RHSA-2012-0052.html
RHSA-2012:0061
http://www.redhat.com/support/errata/RHSA-2012-0061.html
USN-1336-1
http://ubuntu.com/usn/usn-1336-1
VU#470151
http://www.kb.cert.org/vuls/id/470151
[oss-security] 20120117 Re: CVE request: kernel: proc: clean up and fix /proc/<pid>/mem handling
http://www.openwall.com/lists/oss-security/2012/01/18/2
[oss-security] 20120118 CVE request: kernel: proc: clean up and fix /proc/<pid>/mem handling
http://www.openwall.com/lists/oss-security/2012/01/18/1
[oss-security] 20120119 Re: CVE request: kernel: proc: clean up and fix /proc/<pid>/mem handling
http://www.openwall.com/lists/oss-security/2012/01/19/4
[oss-security] 20120122 Re: CVE request: kernel: proc: clean up and fix /proc/<pid>/mem handling
http://www.openwall.com/lists/oss-security/2012/01/22/4
http://blog.zx2c4.com/749
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=e268337dfe26dfc7efd422a804dbb27977a3cccc
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.2
https://bugzilla.redhat.com/show_bug.cgi?id=782642
Common Vulnerability Exposure (CVE) ID: CVE-2012-0207
http://www.openwall.com/lists/oss-security/2012/01/10/5
CopyrightCopyright (C) 2012 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.