First published: Mon Jun 24 2013(Updated: )
Last updated 24 July 2024
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <3.0.86 | |
Linux Kernel | >=3.1<3.2.49 | |
Linux Kernel | >=3.3<3.4.53 | |
Linux Kernel | >=3.5<3.9.10 | |
Linux Kernel | =3.10 | |
Ubuntu Linux | =12.04 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 | |
Ubuntu | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1059 has a medium severity level as it can lead to a denial of service by crashing the system.
To fix CVE-2013-1059, you should upgrade to a patched version of the Linux kernel, specifically to versions 5.10.223-1, 5.10.226-1, 6.1.123-1, or later.
CVE-2013-1059 affects Linux kernel versions from 3.0.0 up to but not including 3.10.
Yes, CVE-2013-1059 can be exploited remotely by a user or program through crafted auth_reply messages.
CVE-2013-1059 is a NULL pointer dereference vulnerability that can cause a system crash.