First published: Tue May 06 2014(Updated: )
A flaw was discovered in the Linux kernel's pseudo tty (pty) device. An unprivileged user could exploit this flaw to cause a denial of service (system crash) or potentially gain administrator privileges.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.2.0-61-omap | <3.2.0-61.93 | 3.2.0-61.93 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-61-powerpc-smp | <3.2.0-61.93 | 3.2.0-61.93 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-61-generic-pae | <3.2.0-61.93 | 3.2.0-61.93 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-61-virtual | <3.2.0-61.93 | 3.2.0-61.93 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-61-highbank | <3.2.0-61.93 | 3.2.0-61.93 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-61-generic | <3.2.0-61.93 | 3.2.0-61.93 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-61-powerpc64-smp | <3.2.0-61.93 | 3.2.0-61.93 |
Ubuntu 22.04 LTS | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-2198-1 is critical as it could allow an unprivileged user to cause a denial of service or gain administrator privileges.
To mitigate the USN-2198-1 vulnerability, update to a Linux kernel version of 3.2.0-61.93 or later for Ubuntu 12.04.
USN-2198-1 affects Ubuntu version 12.04 on various platforms including powerpc, generic, and virtual.
While USN-2198-1 may not directly cause data loss, exploiting the vulnerability could lead to system crashes that may risk data integrity.
The recommended action for USN-2198-1 is to apply the security updates rather than relying on a workaround.