Your submission was sent successfully! Close

USN-1380-1: Linux kernel vulnerabilities

29 February 2012

Several security issues were fixed in the kernel.




A flaw was discovered in the TOMOYO LSM's handling of mount system calls.
An unprivileged user could oops the system causing a denial of service.

A bug was discovered in the Linux kernel's calculation of OOM (Out of
memory) scores, that would result in the wrong process being killed. A user
could use this to kill the process with the highest OOM score, even if that
process belongs to another user or the system. (CVE-2011-4097)

A flaw was found in the linux kernels IPv4 IGMP query processing. A remote
attacker could exploit this to cause a denial of service. (CVE-2012-0207)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 11.04

After a standard system update you need to reboot your computer to make
all the necessary changes.

Related notices

  • USN-1383-1: linux-image-2.6.38-1209-omap4, linux-ti-omap4
  • USN-1386-1: linux-image-2.6.38-13-virtual, linux-image-2.6.38-13-generic-pae, linux-image-2.6.38-13-server, linux-image-2.6.38-13-generic, linux-lts-backport-natty
  • USN-1364-1: linux-image-3.0.0-1207-omap4, linux-ti-omap4
  • USN-1384-1: linux-image-3.0.0-16-generic, linux-image-3.0.0-16-generic-pae, linux-image-3.0.0-16-server, linux-lts-backport-oneiric, linux-image-3.0.0-16-virtual
  • USN-1363-1: linux-image-3.0.0-16-powerpc-smp, linux-image-3.0.0-16-generic, linux-image-3.0.0-16-generic-pae, linux-image-3.0.0-16-server, linux-image-3.0.0-16-powerpc, linux-image-3.0.0-16-powerpc64-smp, linux, linux-image-3.0.0-16-virtual, linux-image-3.0.0-16-omap
  • USN-1356-1: linux-image-2.6.38-1209-omap4, linux-ti-omap4