First published: Tue Oct 09 2012(Updated: )
An error was discovered in the Linux kernel's network TUN/TAP device implementation. A local user with access to the TUN/TAP interface (which is not available to unprivileged users until granted by a root user) could exploit this flaw to crash the system or potential gain administrative privileges.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-2.6.24-32-itanium | <2.6.24-32.105 | 2.6.24-32.105 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-powerpc | <2.6.24-32.105 | 2.6.24-32.105 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-powerpc64-smp | <2.6.24-32.105 | 2.6.24-32.105 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-sparc64 | <2.6.24-32.105 | 2.6.24-32.105 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-server | <2.6.24-32.105 | 2.6.24-32.105 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-openvz | <2.6.24-32.105 | 2.6.24-32.105 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-386 | <2.6.24-32.105 | 2.6.24-32.105 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-hppa32 | <2.6.24-32.105 | 2.6.24-32.105 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-lpiacompat | <2.6.24-32.105 | 2.6.24-32.105 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-mckinley | <2.6.24-32.105 | 2.6.24-32.105 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-lpia | <2.6.24-32.105 | 2.6.24-32.105 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-xen | <2.6.24-32.105 | 2.6.24-32.105 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-hppa64 | <2.6.24-32.105 | 2.6.24-32.105 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-powerpc-smp | <2.6.24-32.105 | 2.6.24-32.105 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-generic | <2.6.24-32.105 | 2.6.24-32.105 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-rt | <2.6.24-32.105 | 2.6.24-32.105 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-virtual | <2.6.24-32.105 | 2.6.24-32.105 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-sparc64-smp | <2.6.24-32.105 | 2.6.24-32.105 |
Ubuntu 22.04 LTS | =8.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-1598-1 is considered high due to potential system crashes and unauthorized access risks.
To fix USN-1598-1, update to the Linux kernel version 2.6.24-32.105 or later on affected Ubuntu 8.04 systems.
USN-1598-1 affects local users with access to the TUN/TAP interface on Ubuntu 8.04 systems utilizing specific kernel versions.
Exploitation of USN-1598-1 could lead to denial of service or potential privilege escalation for users with TUN/TAP access.
No, USN-1598-1 is a local vulnerability that requires a local user to access the vulnerable TUN/TAP interface.