First published: Thu Oct 11 2012(Updated: )
A flaw was found in how the Linux kernel's KVM (Kernel-based Virtual Machine) subsystem handled MSI (Message Signaled Interrupts). A local unprivileged user could exploit this flaw to cause a denial of service or potentially elevate privileges. (CVE-2012-2137) A flaw was found in how the Linux kernel passed the replacement session keyring to a child process. An unprivileged local user could exploit this flaw to cause a denial of service (panic). (CVE-2012-2745)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-2.6.32-44-ia64 | <2.6.32-44.98 | 2.6.32-44.98 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-44-386 | <2.6.32-44.98 | 2.6.32-44.98 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-44-powerpc | <2.6.32-44.98 | 2.6.32-44.98 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-44-preempt | <2.6.32-44.98 | 2.6.32-44.98 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-44-generic-pae | <2.6.32-44.98 | 2.6.32-44.98 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-44-sparc64 | <2.6.32-44.98 | 2.6.32-44.98 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-44-server | <2.6.32-44.98 | 2.6.32-44.98 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-44-powerpc64-smp | <2.6.32-44.98 | 2.6.32-44.98 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-44-sparc64-smp | <2.6.32-44.98 | 2.6.32-44.98 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-44-virtual | <2.6.32-44.98 | 2.6.32-44.98 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-44-versatile | <2.6.32-44.98 | 2.6.32-44.98 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-44-generic | <2.6.32-44.98 | 2.6.32-44.98 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-44-lpia | <2.6.32-44.98 | 2.6.32-44.98 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-44-powerpc-smp | <2.6.32-44.98 | 2.6.32-44.98 |
Ubuntu 22.04 LTS | =10.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-1606-1 is categorized as important due to the potential for denial of service and privilege escalation.
You can fix USN-1606-1 by updating to the linux-image packages version 2.6.32-44.98 or later on Ubuntu 10.04.
USN-1606-1 affects local unprivileged users on Ubuntu 10.04 running specific versions of the Linux kernel.
USN-1606-1 addresses a flaw in the Linux kernel's KVM subsystem related to Message Signaled Interrupts (CVE-2012-2137).
USN-1606-1 is not classified as critical but it has important security implications regarding system stability and unauthorized access.