First published: Fri Aug 10 2012(Updated: )
An error was discovered in the Linux kernel's network TUN/TAP device implementation. A local user with access to the TUN/TAP interface (which is not available to unprivileged users until granted by a root user) could exploit this flaw to crash the system or potential gain administrative privileges. (CVE-2012-2136) An error was discovered in the Linux kernel's memory subsystem (hugetlb). An unprivileged local user could exploit this flaw to cause a denial of service (crash the system). (CVE-2012-2390)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-2.6.32-42-386 | <2.6.32-42.95 | 2.6.32-42.95 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-42-powerpc | <2.6.32-42.95 | 2.6.32-42.95 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-42-powerpc64-smp | <2.6.32-42.95 | 2.6.32-42.95 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-42-generic-pae | <2.6.32-42.95 | 2.6.32-42.95 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-42-sparc64 | <2.6.32-42.95 | 2.6.32-42.95 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-42-generic | <2.6.32-42.95 | 2.6.32-42.95 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-42-versatile | <2.6.32-42.95 | 2.6.32-42.95 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-42-virtual | <2.6.32-42.95 | 2.6.32-42.95 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-42-server | <2.6.32-42.95 | 2.6.32-42.95 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-42-ia64 | <2.6.32-42.95 | 2.6.32-42.95 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-42-sparc64-smp | <2.6.32-42.95 | 2.6.32-42.95 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-42-preempt | <2.6.32-42.95 | 2.6.32-42.95 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-42-powerpc-smp | <2.6.32-42.95 | 2.6.32-42.95 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-42-lpia | <2.6.32-42.95 | 2.6.32-42.95 |
Ubuntu 22.04 LTS | =10.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-1535-1 is classified as high due to the potential for local users to crash the system or escalate privileges.
To fix USN-1535-1, you must update your system to the latest kernel version provided for Ubuntu 10.04.
USN-1535-1 affects Ubuntu 10.04 and its kernel variants including the 2.6.32-42 series.
A potential workaround for USN-1535-1 is to limit access to the TUN/TAP interface to only trusted users.
USN-1535-1 addresses a vulnerability in the Linux kernel's network TUN/TAP device implementation, allowing crashes and privilege escalation.