First published: Wed Sep 05 2012(Updated: )
Chen Haogang discovered an integer overflow that could result in memory corruption. A local unprivileged user could use this to crash the system. (CVE-2012-0044) A flaw was found in the Linux kernel's Reliable Datagram Sockets (RDS) protocol implementation. A local, unprivileged user could use this flaw to cause a denial of service. (CVE-2012-2372) Some errors where discovered in the Linux kernel's UDF file system, which is used to mount some CD-ROMs and DVDs. An unprivileged local user could use these flaws to crash the system. (CVE-2012-3400)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-2.6.32-42-386 | <2.6.32-42.96 | 2.6.32-42.96 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-42-powerpc | <2.6.32-42.96 | 2.6.32-42.96 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-42-powerpc64-smp | <2.6.32-42.96 | 2.6.32-42.96 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-42-generic-pae | <2.6.32-42.96 | 2.6.32-42.96 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-42-sparc64 | <2.6.32-42.96 | 2.6.32-42.96 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-42-generic | <2.6.32-42.96 | 2.6.32-42.96 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-42-versatile | <2.6.32-42.96 | 2.6.32-42.96 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-42-virtual | <2.6.32-42.96 | 2.6.32-42.96 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-42-server | <2.6.32-42.96 | 2.6.32-42.96 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-42-ia64 | <2.6.32-42.96 | 2.6.32-42.96 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-42-sparc64-smp | <2.6.32-42.96 | 2.6.32-42.96 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-42-preempt | <2.6.32-42.96 | 2.6.32-42.96 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-42-powerpc-smp | <2.6.32-42.96 | 2.6.32-42.96 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-42-lpia | <2.6.32-42.96 | 2.6.32-42.96 |
Ubuntu 22.04 LTS | =10.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-1555-1 is categorized as high due to the possibility of memory corruption leading to a system crash by an unprivileged local user.
To fix USN-1555-1, update the affected package to the version 2.6.32-42.96 or later.
USN-1555-1 affects the Linux kernel packages for Ubuntu 10.04 with versions prior to 2.6.32-42.96.
The vulnerability in USN-1555-1 was discovered by Chen Haogang.
USN-1555-1 reports an integer overflow vulnerability that can lead to memory corruption.