First published: Tue Jan 24 2012(Updated: )
Clement Lecigne discovered a bug in the HFS filesystem. A local attacker could exploit this to cause a kernel oops. (CVE-2011-2203) A flaw was found in how the Linux kernel handles user-defined key types. An unprivileged local user could exploit this to crash the system. (CVE-2011-4110)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-2.6.32-38-powerpc | <2.6.32-38.83 | 2.6.32-38.83 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-38-386 | <2.6.32-38.83 | 2.6.32-38.83 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-38-sparc64 | <2.6.32-38.83 | 2.6.32-38.83 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-38-generic-pae | <2.6.32-38.83 | 2.6.32-38.83 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-38-preempt | <2.6.32-38.83 | 2.6.32-38.83 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-38-lpia | <2.6.32-38.83 | 2.6.32-38.83 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-38-sparc64-smp | <2.6.32-38.83 | 2.6.32-38.83 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-38-powerpc64-smp | <2.6.32-38.83 | 2.6.32-38.83 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-38-versatile | <2.6.32-38.83 | 2.6.32-38.83 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-38-generic | <2.6.32-38.83 | 2.6.32-38.83 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-38-ia64 | <2.6.32-38.83 | 2.6.32-38.83 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-38-server | <2.6.32-38.83 | 2.6.32-38.83 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-38-powerpc-smp | <2.6.32-38.83 | 2.6.32-38.83 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-38-virtual | <2.6.32-38.83 | 2.6.32-38.83 |
Ubuntu 22.04 LTS | =10.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerabilities associated with USN-1344-1 can lead to system crashes and potential denial of service if exploited.
To fix USN-1344-1, upgrade to the kernel version 2.6.32-38.83 or later.
USN-1344-1 can cause kernel oops and system crashes when exploited by an unprivileged local user.
The vulnerabilities in USN-1344-1 were discovered by Clement Lecigne.
Ubuntu 10.04 is the affected version for USN-1344-1.