First published: Thu May 31 2012(Updated: )
A flaw was found in the Linux's kernels ext4 file system when mounted with a journal. A local, unprivileged user could exploit this flaw to cause a denial of service. (CVE-2011-4086) A flaw was discovered in the Linux kernel's cifs file system. An unprivileged local user could exploit this flaw to crash the system leading to a denial of service. (CVE-2012-1090) H. Peter Anvin reported a flaw in the Linux kernel that could crash the system. A local user could exploit this flaw to crash the system. (CVE-2012-1097) A flaw was discovered in the Linux kernel's cgroups subset. A local attacker could use this flaw to crash the system. (CVE-2012-1146) A flaw was found in the Linux kernel's ext4 file system when mounting a corrupt filesystem. A user-assisted remote attacker could exploit this flaw to cause a denial of service. (CVE-2012-2100)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-2.6.38-1209-omap4 | <2.6.38-1209.24 | 2.6.38-1209.24 |
Ubuntu gir1.2-packagekitglib-1.0 | =11.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-1458-1 is high due to potential denial of service caused by unprivileged local users.
To fix USN-1458-1, users should update to the patched version of the Linux kernel, specifically version 2.6.38-1209.24.
USN-1458-1 affects Ubuntu 11.04 users running the linux-image-2.6.38-1209-omap4 package.
No, USN-1458-1 requires local access to the system to exploit the vulnerability.
USN-1458-1 involves the ext4 and cifs file systems in the Linux kernel.