First published: Tue Mar 06 2012(Updated: )
Paolo Bonzini discovered a flaw in Linux's handling of the SG_IO ioctl command. A local user, or user in a VM could exploit this flaw to bypass restrictions and gain read/write access to all data on the affected block device. (CVE-2011-4127) A flaw was found in KVM's Programmable Interval Timer (PIT). When a virtual interrupt control is not available a local user could use this to cause a denial of service by starting a timer. (CVE-2011-4622) A flaw was discovered in the XFS filesystem. If a local user mounts a specially crafted XFS image it could potential execute arbitrary code on the system. (CVE-2012-0038) A flaw was found in the Linux kernel's ext4 file system when mounting a corrupt filesystem. A user-assisted remote attacker could exploit this flaw to cause a denial of service. (CVE-2012-2100)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-2.6.32-39-lpia | <2.6.32-39.86 | 2.6.32-39.86 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-39-generic-pae | <2.6.32-39.86 | 2.6.32-39.86 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-39-sparc64 | <2.6.32-39.86 | 2.6.32-39.86 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-39-ia64 | <2.6.32-39.86 | 2.6.32-39.86 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-39-386 | <2.6.32-39.86 | 2.6.32-39.86 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-39-powerpc | <2.6.32-39.86 | 2.6.32-39.86 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-39-versatile | <2.6.32-39.86 | 2.6.32-39.86 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-39-generic | <2.6.32-39.86 | 2.6.32-39.86 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-39-powerpc64-smp | <2.6.32-39.86 | 2.6.32-39.86 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-39-preempt | <2.6.32-39.86 | 2.6.32-39.86 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-39-powerpc-smp | <2.6.32-39.86 | 2.6.32-39.86 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-39-server | <2.6.32-39.86 | 2.6.32-39.86 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-39-sparc64-smp | <2.6.32-39.86 | 2.6.32-39.86 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-39-virtual | <2.6.32-39.86 | 2.6.32-39.86 |
Ubuntu 22.04 LTS | =10.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
USN-1389-1 is considered a critical vulnerability due to its potential to allow unauthorized access to sensitive data.
To fix USN-1389-1, upgrade the affected Linux kernel packages to version 2.6.32-39.86 or later.
USN-1389-1 affects local users and users in virtual machines running specific versions of Ubuntu 10.04.
USN-1389-1 impacts various Ubuntu 10.04 systems with Linux kernel versions prior to 2.6.32-39.86.
USN-1389-1 corresponds to CVE-2011-4127, which describes the vulnerability found in Linux's handling of the SG_IO ioctl command.