First published: Tue Mar 06 2012(Updated: )
Aristide Fattori and Roberto Paleari reported a flaw in the Linux kernel's handling of IPv4 icmp packets. A remote user could exploit this to cause a denial of service. (CVE-2011-1927) A flaw was found in the Linux Ethernet bridge's handling of IGMP (Internet Group Management Protocol) packets. An unprivileged local user could exploit this flaw to crash the system. (CVE-2011-0716) Han-Wen Nienhuys reported a flaw in the FUSE kernel module. A local user who can mount a FUSE file system could cause a denial of service. (CVE-2011-3353) A flaw was discovered in the Linux kernel's AppArmor security interface when invalid information was written to it. An unprivileged local user could use this to cause a denial of service on the system. (CVE-2011-3619) A flaw was found in KVM's Programmable Interval Timer (PIT). When a virtual interrupt control is not available a local user could use this to cause a denial of service by starting a timer. (CVE-2011-4622) A flaw was discovered in the XFS filesystem. If a local user mounts a specially crafted XFS image it could potential execute arbitrary code on the system. (CVE-2012-0038) Chen Haogang discovered an integer overflow that could result in memory corruption. A local unprivileged user could use this to crash the system. (CVE-2012-0044)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-2.6.35-32-virtual | <2.6.35-32.66~lucid1 | 2.6.35-32.66~lucid1 |
Ubuntu gir1.2-packagekitglib-1.0 | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.35-32-server | <2.6.35-32.66~lucid1 | 2.6.35-32.66~lucid1 |
Ubuntu gir1.2-packagekitglib-1.0 | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.35-32-generic-pae | <2.6.35-32.66~lucid1 | 2.6.35-32.66~lucid1 |
Ubuntu gir1.2-packagekitglib-1.0 | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.35-32-generic | <2.6.35-32.66~lucid1 | 2.6.35-32.66~lucid1 |
Ubuntu gir1.2-packagekitglib-1.0 | =10.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-1387-1 is categorized as a denial of service vulnerability in the Linux kernel.
To fix USN-1387-1, it is recommended to upgrade to the corrected version of the affected packages, specifically linux-image-2.6.35-32.66~lucid1.
USN-1387-1 affects Ubuntu 10.04 systems running specific versions of the Linux kernel packages.
The potential impact of the vulnerability in USN-1387-1 is that a remote user could exploit it to cause a denial of service.
The vulnerability in USN-1387-1 was reported by Aristide Fattori and Roberto Paleari.