First published: Thu Dec 20 2012(Updated: )
A flaw was discovered in the Linux kernel's handling of new hot-plugged memory. An unprivileged local user could exploit this flaw to cause a denial of service by crashing the system.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.0.0-29-powerpc64-smp | <3.0.0-29.46 | 3.0.0-29.46 |
Ubuntu 22.04 LTS | =11.10 | |
All of | ||
ubuntu/linux-image-3.0.0-29-generic | <3.0.0-29.46 | 3.0.0-29.46 |
Ubuntu 22.04 LTS | =11.10 | |
All of | ||
ubuntu/linux-image-3.0.0-29-powerpc | <3.0.0-29.46 | 3.0.0-29.46 |
Ubuntu 22.04 LTS | =11.10 | |
All of | ||
ubuntu/linux-image-3.0.0-29-virtual | <3.0.0-29.46 | 3.0.0-29.46 |
Ubuntu 22.04 LTS | =11.10 | |
All of | ||
ubuntu/linux-image-3.0.0-29-generic-pae | <3.0.0-29.46 | 3.0.0-29.46 |
Ubuntu 22.04 LTS | =11.10 | |
All of | ||
ubuntu/linux-image-3.0.0-29-omap | <3.0.0-29.46 | 3.0.0-29.46 |
Ubuntu 22.04 LTS | =11.10 | |
All of | ||
ubuntu/linux-image-3.0.0-29-powerpc-smp | <3.0.0-29.46 | 3.0.0-29.46 |
Ubuntu 22.04 LTS | =11.10 | |
All of | ||
ubuntu/linux-image-3.0.0-29-server | <3.0.0-29.46 | 3.0.0-29.46 |
Ubuntu 22.04 LTS | =11.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability USN-1677-1 is classified as a denial of service flaw in the Linux kernel.
To resolve the USN-1677-1 vulnerability, upgrade to the Linux kernel version 3.0.0-29.46 or later.
The USN-1677-1 vulnerability affects unprivileged local users on systems running specific Ubuntu 11.10 Linux kernel versions.
The affected systems include Ubuntu 11.10 running the specified versions of linux-image packages.
Yes, USN-1677-1 can lead to system crashes, which may result in potential data loss or corruption.