First published: Thu May 16 2013(Updated: )
An flaw was discovered in the Linux kernel's perf_events interface. A local user could exploit this flaw to escalate privileges on the system.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.2.0-43-powerpc64-smp | <3.2.0-43.68 | 3.2.0-43.68 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-43-powerpc-smp | <3.2.0-43.68 | 3.2.0-43.68 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-43-generic-pae | <3.2.0-43.68 | 3.2.0-43.68 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-43-virtual | <3.2.0-43.68 | 3.2.0-43.68 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-43-highbank | <3.2.0-43.68 | 3.2.0-43.68 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-43-omap | <3.2.0-43.68 | 3.2.0-43.68 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-43-generic | <3.2.0-43.68 | 3.2.0-43.68 |
Ubuntu 22.04 LTS | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-1825-1 is considered to be high due to the potential for privilege escalation.
To fix USN-1825-1, upgrade your Linux kernel to version 3.2.0-43.68 or later.
USN-1825-1 affects Ubuntu 12.04 systems using the Linux kernel versions prior to 3.2.0-43.68.
The vulnerability in USN-1825-1 is related to the Linux kernel's perf_events interface, allowing local users to escalate privileges.
There is no official workaround for USN-1825-1; updating to the fixed kernel version is recommended.