[USN-2737-1] Linux kernel (Vivid HWE) vulnerability
Severity
Medium
Affected Packages
8
CVEs
1
The system could be made to crash or run programs as an administrator.
It was discovered that an integer overflow error existed in the SCSI
generic (sg) driver in the Linux kernel. A local attacker with write
permission to a SCSI generic device could use this to cause a denial of
service (system crash) or potentially escalate their privileges.
Package | Affected Version |
---|---|
pkg:deb/ubuntu/linux-image-extra-3.19.0-28-generic?distro=trusty | < 3.19.0-28.30~14.04.1 |
pkg:deb/ubuntu/linux-image-3.19.0-28-powerpc64-smp?distro=trusty | < 3.19.0-28.30~14.04.1 |
pkg:deb/ubuntu/linux-image-3.19.0-28-powerpc64-emb?distro=trusty | < 3.19.0-28.30~14.04.1 |
pkg:deb/ubuntu/linux-image-3.19.0-28-powerpc-smp?distro=trusty | < 3.19.0-28.30~14.04.1 |
pkg:deb/ubuntu/linux-image-3.19.0-28-powerpc-e500mc?distro=trusty | < 3.19.0-28.30~14.04.1 |
pkg:deb/ubuntu/linux-image-3.19.0-28-lowlatency?distro=trusty | < 3.19.0-28.30~14.04.1 |
pkg:deb/ubuntu/linux-image-3.19.0-28-generic?distro=trusty | < 3.19.0-28.30~14.04.1 |
pkg:deb/ubuntu/linux-image-3.19.0-28-generic-lpae?distro=trusty | < 3.19.0-28.30~14.04.1 |
- ID
- USN-2737-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-2737-1
- Published
-
2015-09-09T06:12:17
(9 years ago) - Modified
-
2015-09-09T06:12:17
(9 years ago) - Other Advisories
-
- DSA-3329-1
- ELSA-2017-3534
- ELSA-2017-3535
- SUSE-SU-2015:1478-1
- SUSE-SU-2015:1592-1
- SUSE-SU-2015:1611-1
- SUSE-SU-2015:1678-1
- SUSE-SU-2015:2084-1
- SUSE-SU-2015:2085-1
- SUSE-SU-2015:2086-1
- SUSE-SU-2015:2087-1
- SUSE-SU-2015:2089-1
- SUSE-SU-2015:2090-1
- SUSE-SU-2015:2091-1
- SUSE-SU-2015:2167-1
- SUSE-SU-2016:0585-1
- SUSE-SU-2016:0785-1
- USN-2733-1
- USN-2734-1
- USN-2738-1
- USN-2750-1
- USN-2759-1
- USN-2760-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-extra-3.19.0-28-generic?distro=trusty | ubuntu | linux-image-extra-3.19.0-28-generic | < 3.19.0-28.30~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.19.0-28-powerpc64-smp?distro=trusty | ubuntu | linux-image-3.19.0-28-powerpc64-smp | < 3.19.0-28.30~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.19.0-28-powerpc64-emb?distro=trusty | ubuntu | linux-image-3.19.0-28-powerpc64-emb | < 3.19.0-28.30~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.19.0-28-powerpc-smp?distro=trusty | ubuntu | linux-image-3.19.0-28-powerpc-smp | < 3.19.0-28.30~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.19.0-28-powerpc-e500mc?distro=trusty | ubuntu | linux-image-3.19.0-28-powerpc-e500mc | < 3.19.0-28.30~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.19.0-28-lowlatency?distro=trusty | ubuntu | linux-image-3.19.0-28-lowlatency | < 3.19.0-28.30~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.19.0-28-generic?distro=trusty | ubuntu | linux-image-3.19.0-28-generic | < 3.19.0-28.30~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.19.0-28-generic-lpae?distro=trusty | ubuntu | linux-image-3.19.0-28-generic-lpae | < 3.19.0-28.30~14.04.1 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |