First published: Thu May 30 2013(Updated: )
Kees Cook discovered a flaw in the Linux kernel's iSCSI subsystem. A remote unauthenticated attacker could exploit this flaw to cause a denial of service (system crash) or potentially gain administrative privileges.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.5.0-32-generic | <3.5.0-32.53 | 3.5.0-32.53 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 | |
All of | ||
ubuntu/linux-image-3.5.0-32-omap | <3.5.0-32.53 | 3.5.0-32.53 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 | |
All of | ||
ubuntu/linux-image-3.5.0-32-highbank | <3.5.0-32.53 | 3.5.0-32.53 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 | |
All of | ||
ubuntu/linux-image-3.5.0-32-powerpc-smp | <3.5.0-32.53 | 3.5.0-32.53 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 | |
All of | ||
ubuntu/linux-image-3.5.0-32-powerpc64-smp | <3.5.0-32.53 | 3.5.0-32.53 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-1846-1 is high, as it allows a remote unauthenticated attacker to potentially crash the system or gain administrative privileges.
To fix USN-1846-1, upgrade to the linux-image-3.5.0-32.53 package on Ubuntu 12.10.
USN-1846-1 affects Ubuntu 12.10 with specific kernel packages like linux-image-3.5.0-32-generic and others before version 3.5.0-32.53.
While USN-1846-1 primarily leads to denial of service, it could also enable attackers to gain higher privileges, which may lead to data breaches.
The vulnerability in USN-1846-1 specifically involves the iSCSI subsystem of the Linux kernel.