First published: Sat Apr 26 2014(Updated: )
A flaw was discovered in the Linux kernel's handling of the SCTP handshake. A remote attacker could exploit this flaw to cause a denial of service (system crash). (CVE-2014-0101) An error was discovered in the Linux kernel's DCCP protocol support. A remote attacked could exploit this flaw to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2014-2523)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-2.6.32-58-386 | <2.6.32-58.120 | 2.6.32-58.120 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-58-lpia | <2.6.32-58.120 | 2.6.32-58.120 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-58-ia64 | <2.6.32-58.120 | 2.6.32-58.120 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-58-versatile | <2.6.32-58.120 | 2.6.32-58.120 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-58-server | <2.6.32-58.120 | 2.6.32-58.120 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-58-powerpc64-smp | <2.6.32-58.120 | 2.6.32-58.120 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-58-generic-pae | <2.6.32-58.120 | 2.6.32-58.120 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-58-powerpc-smp | <2.6.32-58.120 | 2.6.32-58.120 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-58-generic | <2.6.32-58.120 | 2.6.32-58.120 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-58-virtual | <2.6.32-58.120 | 2.6.32-58.120 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-58-sparc64-smp | <2.6.32-58.120 | 2.6.32-58.120 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-58-powerpc | <2.6.32-58.120 | 2.6.32-58.120 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-58-preempt | <2.6.32-58.120 | 2.6.32-58.120 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-58-sparc64 | <2.6.32-58.120 | 2.6.32-58.120 |
Ubuntu 22.04 LTS | =10.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of the vulnerability documented in USN-2173-1 is significant due to the potential for a denial of service leading to system crashes.
To resolve the issues related to USN-2173-1, you need to upgrade to linux-image version 2.6.32-58.120 or later on Ubuntu 10.04.
USN-2173-1 affects various Ubuntu 10.04 systems running specific versions of the Linux kernel packages.
USN-2173-1 exploits flaws in the Linux kernel's handling of the SCTP handshake and DCCP protocol, leading to potential system crashes.
No, it is not safe to use your system without fixing USN-2173-1, as unpatched systems are at risk of remote denial of service attacks.