Ubuntu 11.10 : linux vulnerability (USN-1275-1)

Medium Nessus Plugin ID 56917

Synopsis

The remote Ubuntu host is missing one or more security-related
patches.

Description

Peter Huewe discovered an information leak in the handling of reading
security-related TPM data. A local, unprivileged user could read the
results of a previous TPM command. (CVE-2011-1162)

Vasiliy Kulikov discovered that taskstats did not enforce access
restrictions. A local attacker could exploit this to read certain
information, leading to a loss of privacy. (CVE-2011-2494)

Mathieu Desnoyers discovered that the kernel sockets implementation
incorrectly dereferenced user pointers. A local attacker could
possibly exploit this to crash the system. (CVE-2011-4594).

Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

Solution

Update the affected packages.

See Also

https://usn.ubuntu.com/1275-1/

Plugin Details

Severity: Medium

ID: 56917

File Name: ubuntu_USN-1275-1.nasl

Version: 1.8

Type: local

Agent: unix

Published: 2011/11/22

Modified: 2018/12/01

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.9

Temporal Score: 4.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:canonical:ubuntu_linux:linux-image-3.0-generic, p-cpe:/a:canonical:ubuntu_linux:linux-image-3.0-generic-pae, p-cpe:/a:canonical:ubuntu_linux:linux-image-3.0-server, p-cpe:/a:canonical:ubuntu_linux:linux-image-3.0-virtual, cpe:/o:canonical:ubuntu_linux:11.10

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2011/11/21

Reference Information

CVE: CVE-2011-1162, CVE-2011-2494, CVE-2011-4594

BID: 50314

USN: 1275-1