First published: Tue May 06 2014(Updated: )
A flaw was discovered in the Linux kernel's pseudo tty (pty) device. An unprivileged user could exploit this flaw to cause a denial of service (system crash) or potentially gain administrator privileges.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.5.0-49-highbank | <3.5.0-49.74 | 3.5.0-49.74 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 | |
All of | ||
ubuntu/linux-image-3.5.0-49-powerpc-smp | <3.5.0-49.74 | 3.5.0-49.74 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 | |
All of | ||
ubuntu/linux-image-3.5.0-49-omap | <3.5.0-49.74 | 3.5.0-49.74 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 | |
All of | ||
ubuntu/linux-image-3.5.0-49-powerpc64-smp | <3.5.0-49.74 | 3.5.0-49.74 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 | |
All of | ||
ubuntu/linux-image-3.5.0-49-generic | <3.5.0-49.74 | 3.5.0-49.74 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-2202-1 has a high severity as it allows an unprivileged user to potentially crash the system or gain administrator privileges.
To fix USN-2202-1, upgrade the Linux kernel to version 3.5.0-49.74 for Ubuntu 12.10.
USN-2202-1 affects Ubuntu 12.10 with specific kernel packages such as linux-image-3.5.0-49-generic.
The vulnerability in USN-2202-1 is related to a flaw in the Linux kernel's pseudo tty (pty) device.
While USN-2202-1 does not explicitly mention remote code execution, it can lead to a denial of service or privilege escalation, which may be exploited.