First published: Tue Dec 03 2013(Updated: )
A flaw was discovered in the Linux kernel's dm snapshot facility. A remote authenticated user could exploit this flaw to obtain sensitive information or modify/corrupt data. (CVE-2013-4299) Hannes Frederic Sowa discovered a flaw in the Linux kernel's UDP Fragmentation Offload (UFO). An unprivileged local user could exploit this flaw to cause a denial of service (system crash) or possibly gain administrative privileges. (CVE-2013-4470)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.5.0-44-generic | <3.5.0-44.67 | 3.5.0-44.67 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 | |
All of | ||
ubuntu/linux-image-3.5.0-44-powerpc-smp | <3.5.0-44.67 | 3.5.0-44.67 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 | |
All of | ||
ubuntu/linux-image-3.5.0-44-highbank | <3.5.0-44.67 | 3.5.0-44.67 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 | |
All of | ||
ubuntu/linux-image-3.5.0-44-powerpc64-smp | <3.5.0-44.67 | 3.5.0-44.67 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 | |
All of | ||
ubuntu/linux-image-3.5.0-44-omap | <3.5.0-44.67 | 3.5.0-44.67 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-2043-1 is classified as a high severity vulnerability in the Linux kernel.
To fix USN-2043-1, you should upgrade the Linux kernel to version 3.5.0-44.67 or later.
USN-2043-1 affects Ubuntu 12.10 users running specific kernel versions.
A remote authenticated user could exploit USN-2043-1 to obtain sensitive information or modify/corrupt data.
The vulnerability in USN-2043-1 is related to the Linux kernel's dm snapshot facility and UDP Fragmentation Offload (UFO).