First published: Fri Nov 30 2012(Updated: )
Rodrigo Freire discovered a flaw in the Linux kernel's TCP illinois congestion control algorithm. A local attacker could use this to cause a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-2.6.24-32-itanium | <2.6.24-32.106 | 2.6.24-32.106 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-powerpc | <2.6.24-32.106 | 2.6.24-32.106 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-powerpc64-smp | <2.6.24-32.106 | 2.6.24-32.106 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-sparc64 | <2.6.24-32.106 | 2.6.24-32.106 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-server | <2.6.24-32.106 | 2.6.24-32.106 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-openvz | <2.6.24-32.106 | 2.6.24-32.106 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-386 | <2.6.24-32.106 | 2.6.24-32.106 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-hppa32 | <2.6.24-32.106 | 2.6.24-32.106 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-lpiacompat | <2.6.24-32.106 | 2.6.24-32.106 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-mckinley | <2.6.24-32.106 | 2.6.24-32.106 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-lpia | <2.6.24-32.106 | 2.6.24-32.106 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-xen | <2.6.24-32.106 | 2.6.24-32.106 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-hppa64 | <2.6.24-32.106 | 2.6.24-32.106 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-powerpc-smp | <2.6.24-32.106 | 2.6.24-32.106 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-generic | <2.6.24-32.106 | 2.6.24-32.106 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-rt | <2.6.24-32.106 | 2.6.24-32.106 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-virtual | <2.6.24-32.106 | 2.6.24-32.106 |
Ubuntu 22.04 LTS | =8.04 | |
All of | ||
ubuntu/linux-image-2.6.24-32-sparc64-smp | <2.6.24-32.106 | 2.6.24-32.106 |
Ubuntu 22.04 LTS | =8.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-1650-1 is classified as high due to the potential for denial of service by a local attacker.
To fix USN-1650-1, users should upgrade to the latest kernel version 2.6.24-32.106 or later.
USN-1650-1 affects Ubuntu 8.04 systems running specific kernel packages including linux-image-2.6.24-32-server and linux-image-2.6.24-32-generic.
USN-1650-1 is caused by a flaw in the Linux kernel's TCP Illinois congestion control algorithm.
No, USN-1650-1 can only be exploited by a local attacker, not remotely.