First published: Tue Mar 27 2012(Updated: )
Paolo Bonzini discovered a flaw in Linux's handling of the SG_IO ioctl command. A local user, or user in a VM could exploit this flaw to bypass restrictions and gain read/write access to all data on the affected block device. (CVE-2011-4127) A flaw was found in the Linux kernel's ext4 file system when mounting a corrupt filesystem. A user-assisted remote attacker could exploit this flaw to cause a denial of service. (CVE-2012-2100)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.0.0-16-server | <3.0.0-16.29 | 3.0.0-16.29 |
Ubuntu 22.04 LTS | =11.10 | |
All of | ||
ubuntu/linux-image-3.0.0-16-powerpc-smp | <3.0.0-16.29 | 3.0.0-16.29 |
Ubuntu 22.04 LTS | =11.10 | |
All of | ||
ubuntu/linux-image-3.0.0-16-virtual | <3.0.0-16.29 | 3.0.0-16.29 |
Ubuntu 22.04 LTS | =11.10 | |
All of | ||
ubuntu/linux-image-3.0.0-16-powerpc64-smp | <3.0.0-16.29 | 3.0.0-16.29 |
Ubuntu 22.04 LTS | =11.10 | |
All of | ||
ubuntu/linux-image-3.0.0-16-powerpc | <3.0.0-16.29 | 3.0.0-16.29 |
Ubuntu 22.04 LTS | =11.10 | |
All of | ||
ubuntu/linux-image-3.0.0-16-generic-pae | <3.0.0-16.29 | 3.0.0-16.29 |
Ubuntu 22.04 LTS | =11.10 | |
All of | ||
ubuntu/linux-image-3.0.0-16-omap | <3.0.0-16.29 | 3.0.0-16.29 |
Ubuntu 22.04 LTS | =11.10 | |
All of | ||
ubuntu/linux-image-3.0.0-16-generic | <3.0.0-16.29 | 3.0.0-16.29 |
Ubuntu 22.04 LTS | =11.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-1405-1 is considered high due to the potential for local users to gain unauthorized access to block device data.
To fix USN-1405-1, users should update to the kernel version 3.0.0-16.29 or later.
USN-1405-1 affects Ubuntu 11.10 systems running specific versions of the Linux kernel.
The vulnerability leading to USN-1405-1 was discovered by Paolo Bonzini.
An attacker exploiting USN-1405-1 can bypass restrictions to gain read/write access to all data on the affected block device.