First published: Tue Jun 12 2012(Updated: )
Schacher Raindel discovered a flaw in the Linux kernel's memory handling when hugetlb is enabled. An unprivileged local attacker could exploit this flaw to cause a denial of service and potentially gain higher privileges.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-2.6.32-41-server | <2.6.32-41.90 | 2.6.32-41.90 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-41-preempt | <2.6.32-41.90 | 2.6.32-41.90 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-41-ia64 | <2.6.32-41.90 | 2.6.32-41.90 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-41-generic-pae | <2.6.32-41.90 | 2.6.32-41.90 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-41-386 | <2.6.32-41.90 | 2.6.32-41.90 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-41-generic | <2.6.32-41.90 | 2.6.32-41.90 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-41-powerpc | <2.6.32-41.90 | 2.6.32-41.90 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-41-sparc64 | <2.6.32-41.90 | 2.6.32-41.90 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-41-sparc64-smp | <2.6.32-41.90 | 2.6.32-41.90 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-41-powerpc-smp | <2.6.32-41.90 | 2.6.32-41.90 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-41-virtual | <2.6.32-41.90 | 2.6.32-41.90 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-41-powerpc64-smp | <2.6.32-41.90 | 2.6.32-41.90 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-41-versatile | <2.6.32-41.90 | 2.6.32-41.90 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-41-lpia | <2.6.32-41.90 | 2.6.32-41.90 |
Ubuntu 22.04 LTS | =10.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-1468-1 is considered a high severity vulnerability that could lead to denial of service and potential privilege escalation.
To fix USN-1468-1, you should upgrade the affected Linux kernel packages to version 2.6.32-41.90 or later.
USN-1468-1 affects various configurations of Ubuntu 10.04 with kernels that have hugetlb enabled.
No, USN-1468-1 requires local access for exploitation, meaning an attacker must be on the system.
Hugetlb refers to huge pages in Linux memory management, which optimize for large memory workloads.