First published: Fri Jun 20 2014(Updated: )
A bounds check error was discovered in the socket filter subsystem of the Linux kernel. A local user could exploit this flaw to cause a denial of service (system crash) via crafted BPF instructions. (CVE-2014-3144) A remainder calculation error was discovered in the socket filter subsystem of the Linux kernel. A local user could exploit this flaw to cause a denial of service (system crash) via crafted BPF instructions. (CVE-2014-3145)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-2.6.32-62-powerpc-smp | <2.6.32-62.125 | 2.6.32-62.125 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-62-versatile | <2.6.32-62.125 | 2.6.32-62.125 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-62-server | <2.6.32-62.125 | 2.6.32-62.125 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-62-powerpc64-smp | <2.6.32-62.125 | 2.6.32-62.125 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-62-lpia | <2.6.32-62.125 | 2.6.32-62.125 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-62-386 | <2.6.32-62.125 | 2.6.32-62.125 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-62-generic-pae | <2.6.32-62.125 | 2.6.32-62.125 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-62-sparc64-smp | <2.6.32-62.125 | 2.6.32-62.125 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-62-preempt | <2.6.32-62.125 | 2.6.32-62.125 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-62-sparc64 | <2.6.32-62.125 | 2.6.32-62.125 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-62-virtual | <2.6.32-62.125 | 2.6.32-62.125 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-62-ia64 | <2.6.32-62.125 | 2.6.32-62.125 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-62-generic | <2.6.32-62.125 | 2.6.32-62.125 |
Ubuntu 22.04 LTS | =10.04 | |
All of | ||
ubuntu/linux-image-2.6.32-62-powerpc | <2.6.32-62.125 | 2.6.32-62.125 |
Ubuntu 22.04 LTS | =10.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-2251-1 is categorized as high due to the potential for denial of service.
To fix USN-2251-1, update your Ubuntu system to version 2.6.32-62.125 or later.
Ubuntu 10.04 with kernel version prior to 2.6.32-62.125 is affected by USN-2251-1.
USN-2251-1 addresses a bounds check error and a remainder calculation error in the socket filter subsystem of the Linux kernel.
USN-2251-1 is a local vulnerability, meaning it can only be exploited by a local user with access to the system.