[USN-2204-1] Linux kernel vulnerability
Severity
Critical
Affected Packages
9
CVEs
1
The system could be made to crash or run programs as an administrator.
A flaw was discovered in the Linux kernel's pseudo tty (pty) device. An
unprivileged user could exploit this flaw to cause a denial of service
(system crash) or potentially gain administrator privileges.
Package | Affected Version |
---|---|
pkg:deb/ubuntu/linux-image-extra-3.13.0-24-generic?distro=trusty | < 3.13.0-24.47 |
pkg:deb/ubuntu/linux-image-3.13.0-24-powerpc64-smp?distro=trusty | < 3.13.0-24.47 |
pkg:deb/ubuntu/linux-image-3.13.0-24-powerpc64-emb?distro=trusty | < 3.13.0-24.47 |
pkg:deb/ubuntu/linux-image-3.13.0-24-powerpc-smp?distro=trusty | < 3.13.0-24.47 |
pkg:deb/ubuntu/linux-image-3.13.0-24-powerpc-e500mc?distro=trusty | < 3.13.0-24.47 |
pkg:deb/ubuntu/linux-image-3.13.0-24-powerpc-e500?distro=trusty | < 3.13.0-24.47 |
pkg:deb/ubuntu/linux-image-3.13.0-24-lowlatency?distro=trusty | < 3.13.0-24.47 |
pkg:deb/ubuntu/linux-image-3.13.0-24-generic?distro=trusty | < 3.13.0-24.47 |
pkg:deb/ubuntu/linux-image-3.13.0-24-generic-lpae?distro=trusty | < 3.13.0-24.47 |
- ID
- USN-2204-1
- Severity
- critical
- URL
- https://ubuntu.com/security/notices/USN-2204-1
- Published
-
2014-05-06T02:43:54
(10 years ago) - Modified
-
2014-05-06T02:43:54
(10 years ago) - Other Advisories
-
- ALAS-2014-339
- ALAS-2014-392
- CISA-2023:0512
- DSA-2926-1
- ELSA-2014-0678
- ELSA-2014-3034
- ELSA-2014-3053
- ELSA-2014-3054
- FEDORA-2014-11031
- FEDORA-2014-13045
- FEDORA-2014-13558
- FEDORA-2014-13773
- FEDORA-2014-15200
- FEDORA-2014-16632
- FEDORA-2014-17283
- FEDORA-2014-6122
- FEDORA-2014-6354
- FEDORA-2014-6357
- FEDORA-2014-7033
- FEDORA-2014-7128
- FEDORA-2014-7430
- FEDORA-2014-7863
- FEDORA-2014-8171
- FEDORA-2014-8519
- FEDORA-2014-9010
- FEDORA-2014-9466
- FEDORA-2014-9959
- FEDORA-2015-0515
- FEDORA-2015-1672
- FEDORA-2015-3594
- FEDORA-2015-5024
- FEDORA-2015-6294
- FEDORA-2015-8518
- RHSA-2013:0744
- RHSA-2014:0678
- SUSE-SU-2015:0481-1
- SUSE-SU-2015:0581-1
- SUSE-SU-2015:0652-1
- SUSE-SU-2015:0736-1
- SUSE-SU-2015:1174-1
- SUSE-SU-2015:1376-1
- USN-2196-1
- USN-2197-1
- USN-2198-1
- USN-2199-1
- USN-2200-1
- USN-2201-1
- USN-2202-1
- USN-2203-1
- USN-2227-1
- USN-2260-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-extra-3.13.0-24-generic?distro=trusty | ubuntu | linux-image-extra-3.13.0-24-generic | < 3.13.0-24.47 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-24-powerpc64-smp?distro=trusty | ubuntu | linux-image-3.13.0-24-powerpc64-smp | < 3.13.0-24.47 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-24-powerpc64-emb?distro=trusty | ubuntu | linux-image-3.13.0-24-powerpc64-emb | < 3.13.0-24.47 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-24-powerpc-smp?distro=trusty | ubuntu | linux-image-3.13.0-24-powerpc-smp | < 3.13.0-24.47 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-24-powerpc-e500mc?distro=trusty | ubuntu | linux-image-3.13.0-24-powerpc-e500mc | < 3.13.0-24.47 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-24-powerpc-e500?distro=trusty | ubuntu | linux-image-3.13.0-24-powerpc-e500 | < 3.13.0-24.47 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-24-lowlatency?distro=trusty | ubuntu | linux-image-3.13.0-24-lowlatency | < 3.13.0-24.47 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-24-generic?distro=trusty | ubuntu | linux-image-3.13.0-24-generic | < 3.13.0-24.47 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-24-generic-lpae?distro=trusty | ubuntu | linux-image-3.13.0-24-generic-lpae | < 3.13.0-24.47 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |