First published: Fri Aug 10 2012(Updated: )
An error was discovered in the Linux kernel's network TUN/TAP device implementation. A local user with access to the TUN/TAP interface (which is not available to unprivileged users until granted by a root user) could exploit this flaw to crash the system or potential gain administrative privileges. (CVE-2012-2136) Ulrich Obergfell discovered an error in the Linux kernel's memory management subsystem on 32 bit PAE systems with more than 4GB of memory installed. A local unprivileged user could exploit this flaw to crash the system. (CVE-2012-2373) An error was discovered in the Linux kernel's memory subsystem (hugetlb). An unprivileged local user could exploit this flaw to cause a denial of service (crash the system). (CVE-2012-2390) A flaw was discovered in the Linux kernel's epoll system call. An unprivileged local user could use this flaw to crash the system. (CVE-2012-3375) Some errors where discovered in the Linux kernel's UDF file system, which is used to mount some CD-ROMs and DVDs. An unprivileged local user could use these flaws to crash the system. (CVE-2012-3400) A flaw was discovered in the madvise feature of the Linux kernel's memory subsystem. An unprivileged local use could exploit the flaw to cause a denial of service (crash the system). (CVE-2012-3511)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.0.0-24-powerpc64-smp | <3.0.0-24.40 | 3.0.0-24.40 |
Ubuntu 22.04 LTS | =11.10 | |
All of | ||
ubuntu/linux-image-3.0.0-24-virtual | <3.0.0-24.40 | 3.0.0-24.40 |
Ubuntu 22.04 LTS | =11.10 | |
All of | ||
ubuntu/linux-image-3.0.0-24-generic | <3.0.0-24.40 | 3.0.0-24.40 |
Ubuntu 22.04 LTS | =11.10 | |
All of | ||
ubuntu/linux-image-3.0.0-24-powerpc-smp | <3.0.0-24.40 | 3.0.0-24.40 |
Ubuntu 22.04 LTS | =11.10 | |
All of | ||
ubuntu/linux-image-3.0.0-24-omap | <3.0.0-24.40 | 3.0.0-24.40 |
Ubuntu 22.04 LTS | =11.10 | |
All of | ||
ubuntu/linux-image-3.0.0-24-powerpc | <3.0.0-24.40 | 3.0.0-24.40 |
Ubuntu 22.04 LTS | =11.10 | |
All of | ||
ubuntu/linux-image-3.0.0-24-server | <3.0.0-24.40 | 3.0.0-24.40 |
Ubuntu 22.04 LTS | =11.10 | |
All of | ||
ubuntu/linux-image-3.0.0-24-generic-pae | <3.0.0-24.40 | 3.0.0-24.40 |
Ubuntu 22.04 LTS | =11.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
USN-1533-1 is classified as a moderate severity vulnerability.
To fix USN-1533-1, upgrade to the patched version 3.0.0-24.40 of the affected Linux kernel packages on Ubuntu 11.10.
USN-1533-1 affects users of Ubuntu 11.10 running specific versions of the Linux kernel, including linux-image-3.0.0-24.
USN-1533-1 addresses a flaw in the TUN/TAP device implementation of the Linux kernel that allows a local user to crash the system.
Yes, users must manually update their kernel packages to remediate the vulnerability associated with USN-1533-1.