First published: Fri Oct 12 2012(Updated: )
Pablo Neira Ayuso discovered a flaw in the credentials of netlink messages. An unprivileged local attacker could exploit this by getting a netlink based service, that relies on netlink credentials, to perform privileged actions. (CVE-2012-3520) Mathias Krause discovered information leak in the Linux kernel's compat ioctl interface. A local user could exploit the flaw to examine parts of kernel stack memory (CVE-2012-6539) Mathias Krause discovered an information leak in the Linux kernel's getsockopt for IP_VS_SO_GET_TIMEOUT. A local user could exploit this flaw to examine parts of kernel stack memory. (CVE-2012-6540) Mathias Krause discovered an information leak in the Linux kernel's getsockopt implementation for the Datagram Congestion Control Protocol (DCCP). A local user could exploit this flaw to examine some of the kernel's stack memory. (CVE-2012-6541) Mathias Krause discovered an information leak in the Linux kernel's getsockname implementation for Logical Link Layer (llc) sockets. A local user could exploit this flaw to examine some of the kernel's stack memory. (CVE-2012-6542) Mathias Krause discovered information leaks in the Linux kernel's Bluetooth Logical Link Control and Adaptation Protocol (L2CAP) implementation. A local user could exploit these flaws to examine some of the kernel's stack memory. (CVE-2012-6544) Mathias Krause discovered information leaks in the Linux kernel's Bluetooth RFCOMM protocol implementation. A local user could exploit these flaws to examine parts of kernel memory. (CVE-2012-6545) Mathias Krause discovered information leaks in the Linux kernel's Asynchronous Transfer Mode (ATM) networking stack. A local user could exploit these flaws to examine some parts of kernel memory. (CVE-2012-6546) A flaw was discovered in how netlink sockets validate message origins. A local attacker could exploit this flaw to send netlink message notifications, with spoofed credentials, to subscribed tasks. (CVE-2012-6689) Mathias Krause discover an error in Linux kernel's Datagram Congestion Control Protocol (DCCP) Congestion Control Identifier (CCID) use. A local attack could exploit this flaw to cause a denial of service (crash) and potentially escalate privileges if the user can mmap page 0. (CVE-2013-1827)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.2.0-32-omap | <3.2.0-32.51 | 3.2.0-32.51 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-32-powerpc-smp | <3.2.0-32.51 | 3.2.0-32.51 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-32-highbank | <3.2.0-32.51 | 3.2.0-32.51 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-32-powerpc64-smp | <3.2.0-32.51 | 3.2.0-32.51 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-32-generic-pae | <3.2.0-32.51 | 3.2.0-32.51 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-32-virtual | <3.2.0-32.51 | 3.2.0-32.51 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-32-generic | <3.2.0-32.51 | 3.2.0-32.51 |
Ubuntu 22.04 LTS | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
USN-1610-1 has a high severity due to the potential for unprivileged local attackers to exploit privileged actions.
To resolve USN-1610-1, update your system to the recommended version linux-image-3.2.0-32.51 or later.
USN-1610-1 affects Ubuntu version 12.04.
The vulnerability in USN-1610-1 was discovered by Pablo Neira Ayuso and Mathias Krause.
USN-1610-1 describes a vulnerability related to netlink message credentials that could allow local attackers to perform privileged actions.