First published: Tue Aug 20 2013(Updated: )
An information leak was discovered in the Linux kernel's fanotify interface. A local user could exploit this flaw to obtain sensitive information from kernel memory.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.2.0-52-highbank | <3.2.0-52.78 | 3.2.0-52.78 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-52-generic-pae | <3.2.0-52.78 | 3.2.0-52.78 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-52-powerpc64-smp | <3.2.0-52.78 | 3.2.0-52.78 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-52-omap | <3.2.0-52.78 | 3.2.0-52.78 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-52-generic | <3.2.0-52.78 | 3.2.0-52.78 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-52-powerpc-smp | <3.2.0-52.78 | 3.2.0-52.78 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-52-virtual | <3.2.0-52.78 | 3.2.0-52.78 |
Ubuntu 22.04 LTS | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-1929-1 addresses a high-severity information leak vulnerability in the Linux kernel's fanotify interface.
To fix USN-1929-1, upgrade to the Linux kernel version 3.2.0-52.78 or later on affected Ubuntu 12.04 systems.
Ubuntu 12.04 is the only affected version for the USN-1929-1 vulnerability.
USN-1929-1 allows local users to potentially access sensitive information from the kernel memory.
The vulnerability in USN-1929-1 can be exploited by local users with access to the system.