Ubuntu Security Notice 1380-1 - The linux kernel did not properly account for PTE pages when deciding which task to kill in out of memory conditions. A local, unprivileged could exploit this flaw to cause a denial of service. A flaw was discovered in the TOMOYO LSM's handling of mount system calls. An unprivileged user could oops the system causing a denial of service. A bug was discovered in the Linux kernel's calculation of OOM (Out of memory) scores, that would result in the wrong process being killed. A user could use this to kill the process with the highest OOM score, even if that process belongs to another user or the system. Various other issues were also addressed.
75b2e946d5ac4bde2cd9ccb2f923e5ac56c71eccf01382aa1830ca8d92bf01c6
============================================================================
Ubuntu Security Notice USN-1380-1
February 29, 2012
linux vulnerabilities
============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 11.04
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux: Linux kernel
Details:
The linux kernel did not properly account for PTE pages when deciding which
task to kill in out of memory conditions. A local, unprivileged could
exploit this flaw to cause a denial of service. (CVE-2011-2498)
A flaw was discovered in the TOMOYO LSM's handling of mount system calls.
An unprivileged user could oops the system causing a denial of service.
(CVE-2011-2518)
A bug was discovered in the Linux kernel's calculation of OOM (Out of
memory) scores, that would result in the wrong process being killed. A user
could use this to kill the process with the highest OOM score, even if that
process belongs to another user or the system. (CVE-2011-4097)
A flaw was found in the linux kernels IPv4 IGMP query processing. A remote
attacker could exploit this to cause a denial of service. (CVE-2012-0207)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 11.04:
linux-image-2.6.38-13-generic 2.6.38-13.56
linux-image-2.6.38-13-generic-pae 2.6.38-13.56
linux-image-2.6.38-13-omap 2.6.38-13.56
linux-image-2.6.38-13-powerpc 2.6.38-13.56
linux-image-2.6.38-13-powerpc-smp 2.6.38-13.56
linux-image-2.6.38-13-powerpc64-smp 2.6.38-13.56
linux-image-2.6.38-13-server 2.6.38-13.56
linux-image-2.6.38-13-versatile 2.6.38-13.56
linux-image-2.6.38-13-virtual 2.6.38-13.56
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1380-1
CVE-2011-2498, CVE-2011-2518, CVE-2011-4097, CVE-2012-0207
Package Information:
https://launchpad.net/ubuntu/+source/linux/2.6.38-13.56