[USN-2274-1] Linux kernel vulnerability
Severity
High
Affected Packages
9
CVEs
1
The system could be made to crash or run programs as an administrator.
Andy Lutomirski discovered a flaw with the Linux kernel's ptrace syscall on
x86_64 processors. An attacker could exploit this flaw to cause a denial of
service (System Crash) or potential gain administrative privileges.
Package | Affected Version |
---|---|
pkg:deb/ubuntu/linux-image-extra-3.13.0-30-generic?distro=trusty | < 3.13.0-30.55 |
pkg:deb/ubuntu/linux-image-3.13.0-30-powerpc64-smp?distro=trusty | < 3.13.0-30.55 |
pkg:deb/ubuntu/linux-image-3.13.0-30-powerpc64-emb?distro=trusty | < 3.13.0-30.55 |
pkg:deb/ubuntu/linux-image-3.13.0-30-powerpc-smp?distro=trusty | < 3.13.0-30.55 |
pkg:deb/ubuntu/linux-image-3.13.0-30-powerpc-e500mc?distro=trusty | < 3.13.0-30.55 |
pkg:deb/ubuntu/linux-image-3.13.0-30-powerpc-e500?distro=trusty | < 3.13.0-30.55 |
pkg:deb/ubuntu/linux-image-3.13.0-30-lowlatency?distro=trusty | < 3.13.0-30.55 |
pkg:deb/ubuntu/linux-image-3.13.0-30-generic?distro=trusty | < 3.13.0-30.55 |
pkg:deb/ubuntu/linux-image-3.13.0-30-generic-lpae?distro=trusty | < 3.13.0-30.55 |
- ID
- USN-2274-1
- Severity
- high
- URL
- https://ubuntu.com/security/notices/USN-2274-1
- Published
-
2014-07-05T18:03:34
(10 years ago) - Modified
-
2014-07-05T18:03:34
(10 years ago) - Other Advisories
-
- DSA-2972-1
- ELSA-2014-0923
- ELSA-2014-0924
- ELSA-2014-3046
- ELSA-2014-3047
- ELSA-2014-3048
- ELSA-2014-3049
- FEDORA-2014-11008
- FEDORA-2014-11031
- FEDORA-2014-13020
- FEDORA-2014-13045
- FEDORA-2014-13558
- FEDORA-2014-13773
- FEDORA-2014-14068
- FEDORA-2014-15200
- FEDORA-2014-16632
- FEDORA-2014-17244
- FEDORA-2014-17283
- FEDORA-2014-8171
- FEDORA-2014-8487
- FEDORA-2014-8519
- FEDORA-2014-9010
- FEDORA-2014-9142
- FEDORA-2014-9449
- FEDORA-2014-9466
- FEDORA-2014-9959
- FEDORA-2015-0515
- FEDORA-2015-1672
- FEDORA-2015-3594
- FEDORA-2015-5024
- FEDORA-2015-6294
- FEDORA-2015-8518
- RHSA-2014:0923
- RHSA-2014:0924
- SUSE-SU-2015:0481-1
- SUSE-SU-2015:0581-1
- SUSE-SU-2015:0652-1
- SUSE-SU-2015:0736-1
- SUSE-SU-2015:1174-1
- SUSE-SU-2015:1376-1
- USN-2266-1
- USN-2267-1
- USN-2268-1
- USN-2269-1
- USN-2270-1
- USN-2271-1
- USN-2272-1
- USN-2273-1
- USN-2284-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-extra-3.13.0-30-generic?distro=trusty | ubuntu | linux-image-extra-3.13.0-30-generic | < 3.13.0-30.55 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-30-powerpc64-smp?distro=trusty | ubuntu | linux-image-3.13.0-30-powerpc64-smp | < 3.13.0-30.55 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-30-powerpc64-emb?distro=trusty | ubuntu | linux-image-3.13.0-30-powerpc64-emb | < 3.13.0-30.55 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-30-powerpc-smp?distro=trusty | ubuntu | linux-image-3.13.0-30-powerpc-smp | < 3.13.0-30.55 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-30-powerpc-e500mc?distro=trusty | ubuntu | linux-image-3.13.0-30-powerpc-e500mc | < 3.13.0-30.55 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-30-powerpc-e500?distro=trusty | ubuntu | linux-image-3.13.0-30-powerpc-e500 | < 3.13.0-30.55 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-30-lowlatency?distro=trusty | ubuntu | linux-image-3.13.0-30-lowlatency | < 3.13.0-30.55 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-30-generic?distro=trusty | ubuntu | linux-image-3.13.0-30-generic | < 3.13.0-30.55 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-30-generic-lpae?distro=trusty | ubuntu | linux-image-3.13.0-30-generic-lpae | < 3.13.0-30.55 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |