First published: Thu Jun 05 2014(Updated: )
Pinkie Pie discovered a flaw in the Linux kernel's futex subsystem. An unprivileged local user could exploit this flaw to cause a denial of service (system crash) or gain administrative privileges. (CVE-2014-3153) Dmitry Vyukov reported a flaw in the Linux kernel's handling of IPv6 UDP Fragmentation Offload (UFO) processing. A remote attacker could leverage this flaw to cause a denial of service (system crash). (CVE-2013-4387) Hannes Frederic Sowa discovered a flaw in the Linux kernel's UDP Fragmentation Offload (UFO). An unprivileged local user could exploit this flaw to cause a denial of service (system crash) or possibly gain administrative privileges. (CVE-2013-4470) A flaw was discovered in the Linux kernel's IPC reference counting. An unprivileged local user could exploit this flaw to cause a denial of service (OOM system crash). (CVE-2013-4483) halfdog reported an error in the AMD K7 and K8 platform support in the Linux kernel. An unprivileged local user could exploit this flaw on AMD based systems to cause a denial of service (task kill) or possibly gain privileges via a crafted application. (CVE-2014-1438) Sasha Levin reported a bug in the Linux kernel's virtual memory management subsystem. An unprivileged local user could exploit this flaw to cause a denial of service (system crash). (CVE-2014-3122)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-2.6.32-61-preempt | <2.6.32-61.124 | 2.6.32-61.124 |
=10.04 | ||
All of | ||
ubuntu/linux-image-2.6.32-61-powerpc-smp | <2.6.32-61.124 | 2.6.32-61.124 |
=10.04 | ||
All of | ||
ubuntu/linux-image-2.6.32-61-ia64 | <2.6.32-61.124 | 2.6.32-61.124 |
=10.04 | ||
All of | ||
ubuntu/linux-image-2.6.32-61-generic-pae | <2.6.32-61.124 | 2.6.32-61.124 |
=10.04 | ||
All of | ||
ubuntu/linux-image-2.6.32-61-virtual | <2.6.32-61.124 | 2.6.32-61.124 |
=10.04 | ||
All of | ||
ubuntu/linux-image-2.6.32-61-lpia | <2.6.32-61.124 | 2.6.32-61.124 |
=10.04 | ||
All of | ||
ubuntu/linux-image-2.6.32-61-386 | <2.6.32-61.124 | 2.6.32-61.124 |
=10.04 | ||
All of | ||
ubuntu/linux-image-2.6.32-61-sparc64-smp | <2.6.32-61.124 | 2.6.32-61.124 |
=10.04 | ||
All of | ||
ubuntu/linux-image-2.6.32-61-generic | <2.6.32-61.124 | 2.6.32-61.124 |
=10.04 | ||
All of | ||
ubuntu/linux-image-2.6.32-61-powerpc | <2.6.32-61.124 | 2.6.32-61.124 |
=10.04 | ||
All of | ||
ubuntu/linux-image-2.6.32-61-sparc64 | <2.6.32-61.124 | 2.6.32-61.124 |
=10.04 | ||
All of | ||
ubuntu/linux-image-2.6.32-61-powerpc64-smp | <2.6.32-61.124 | 2.6.32-61.124 |
=10.04 | ||
All of | ||
ubuntu/linux-image-2.6.32-61-server | <2.6.32-61.124 | 2.6.32-61.124 |
=10.04 | ||
All of | ||
ubuntu/linux-image-2.6.32-61-versatile | <2.6.32-61.124 | 2.6.32-61.124 |
=10.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)