USN-1364-1 : linux-ti-omap4 vulnerabilities

high Nessus Plugin ID 57938

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

A flaw was discovered in the XFS filesystem. If a local user mounts a specially crafted XFS image it could potential execute arbitrary code on the system. (CVE-2012-0038)

Andy Whitcroft discovered a that the Overlayfs filesystem was not doing the extended permission checks needed by cgroups and Linux Security Modules (LSMs). A local user could exploit this to by-pass security policy and access files that should not be accessible.
(CVE-2012-0055)

Juri Aedla discovered that the kernel incorrectly handled /proc/<pid>/mem permissions. A local attacker could exploit this and gain root privileges. (CVE-2012-0056)

A flaw was found in the linux kernels IPv4 IGMP query processing. A remote attacker could exploit this to cause a denial of service.
(CVE-2012-0207)

Solution

Update the affected package(s).

See Also

http://www.ubuntu.com/usn/usn-1364-1/

Plugin Details

Severity: High

ID: 57938

File Name: ubuntu_USN-1364-1.nasl

Version: Revision: 1.7

Type: local

Agent: unix

Published: 2/14/2012

Updated: 12/1/2016

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent

Risk Information

VPR

Risk Factor: Critical

Score: 9.7

CVSS v2

Risk Factor: High

Base Score: 7.8

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/o:canonical:ubuntu_linux

Required KB Items: Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/13/2012

Exploitable With

CANVAS (CANVAS)

Core Impact

Reference Information

CVE: CVE-2012-0038, CVE-2012-0055, CVE-2012-0056, CVE-2012-0207

USN: 1364-1