First published: Tue Jul 17 2012(Updated: )
A flaw was found in the Linux kernel's KVM (Kernel Virtual Machine) virtual cpu setup. An unprivileged local user could exploit this flaw to crash the system leading to a denial of service. (CVE-2012-1601) An error was found in the Linux kernel's IPv6 netfilter when connection tracking is enabled. A remote attacker could exploit this flaw to crash a system if it is using IPv6 with the nf_contrack_ipv6 kernel module loaded. (CVE-2012-2744)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-2.6.24-32-itanium | <2.6.24-32.104 | 2.6.24-32.104 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-powerpc | <2.6.24-32.104 | 2.6.24-32.104 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-powerpc64-smp | <2.6.24-32.104 | 2.6.24-32.104 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-sparc64 | <2.6.24-32.104 | 2.6.24-32.104 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-server | <2.6.24-32.104 | 2.6.24-32.104 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-openvz | <2.6.24-32.104 | 2.6.24-32.104 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-386 | <2.6.24-32.104 | 2.6.24-32.104 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-hppa32 | <2.6.24-32.104 | 2.6.24-32.104 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-lpiacompat | <2.6.24-32.104 | 2.6.24-32.104 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-mckinley | <2.6.24-32.104 | 2.6.24-32.104 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-lpia | <2.6.24-32.104 | 2.6.24-32.104 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-xen | <2.6.24-32.104 | 2.6.24-32.104 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-hppa64 | <2.6.24-32.104 | 2.6.24-32.104 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-powerpc-smp | <2.6.24-32.104 | 2.6.24-32.104 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-generic | <2.6.24-32.104 | 2.6.24-32.104 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-rt | <2.6.24-32.104 | 2.6.24-32.104 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-virtual | <2.6.24-32.104 | 2.6.24-32.104 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-sparc64-smp | <2.6.24-32.104 | 2.6.24-32.104 |
Ubuntu 22.04 LTS | =8.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-1507-1 is classified as high due to the potential for unprivileged local users to crash the system.
To fix USN-1507-1, update your Linux kernel to version 2.6.24-32.104 or later.
USN-1507-1 addresses vulnerabilities related to the KVM virtual CPU setup and the IPv6 netfilter connection tracking.
USN-1507-1 affects Ubuntu 8.04 with specific Linux kernel packages.
Yes, the vulnerabilities in USN-1507-1 can be exploited to cause a denial of service.