First published: Mon Jul 29 2013(Updated: )
Kees Cook discovered a format string vulnerability in the Broadcom B43 wireless driver for the Linux kernel. A local user could exploit this flaw to gain administrative privileges.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.5.0-37-powerpc64-smp | <3.5.0-37.58 | 3.5.0-37.58 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 | |
All of | ||
ubuntu/linux-image-3.5.0-37-highbank | <3.5.0-37.58 | 3.5.0-37.58 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 | |
All of | ||
ubuntu/linux-image-3.5.0-37-omap | <3.5.0-37.58 | 3.5.0-37.58 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 | |
All of | ||
ubuntu/linux-image-3.5.0-37-powerpc-smp | <3.5.0-37.58 | 3.5.0-37.58 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 | |
All of | ||
ubuntu/linux-image-3.5.0-37-generic | <3.5.0-37.58 | 3.5.0-37.58 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-1917-1 is critically high due to the potential for local users to gain administrative privileges.
To fix USN-1917-1, upgrade the affected packages to version 3.5.0-37.58 or later.
USN-1917-1 affects Ubuntu version 12.10.
USN-1917-1 describes a format string vulnerability in the Broadcom B43 wireless driver.
No, USN-1917-1 requires local access for exploitation.