[USN-3105-1] Linux kernel vulnerability

Severity High
Affected Packages 9
CVEs 1

The system could be made to run programs as an administrator.

It was discovered that a race condition existed in the memory manager of
the Linux kernel when handling copy-on-write breakage of private read-only
memory mappings. A local attacker could use this to gain administrative
privileges.

Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:deb/ubuntu/linux-image-extra-3.13.0-100-generic?distro=trusty ubuntu linux-image-extra-3.13.0-100-generic < 3.13.0-100.147 trusty
Affected pkg:deb/ubuntu/linux-image-3.13.0-100-powerpc64-smp?distro=trusty ubuntu linux-image-3.13.0-100-powerpc64-smp < 3.13.0-100.147 trusty
Affected pkg:deb/ubuntu/linux-image-3.13.0-100-powerpc64-emb?distro=trusty ubuntu linux-image-3.13.0-100-powerpc64-emb < 3.13.0-100.147 trusty
Affected pkg:deb/ubuntu/linux-image-3.13.0-100-powerpc-smp?distro=trusty ubuntu linux-image-3.13.0-100-powerpc-smp < 3.13.0-100.147 trusty
Affected pkg:deb/ubuntu/linux-image-3.13.0-100-powerpc-e500mc?distro=trusty ubuntu linux-image-3.13.0-100-powerpc-e500mc < 3.13.0-100.147 trusty
Affected pkg:deb/ubuntu/linux-image-3.13.0-100-powerpc-e500?distro=trusty ubuntu linux-image-3.13.0-100-powerpc-e500 < 3.13.0-100.147 trusty
Affected pkg:deb/ubuntu/linux-image-3.13.0-100-lowlatency?distro=trusty ubuntu linux-image-3.13.0-100-lowlatency < 3.13.0-100.147 trusty
Affected pkg:deb/ubuntu/linux-image-3.13.0-100-generic?distro=trusty ubuntu linux-image-3.13.0-100-generic < 3.13.0-100.147 trusty
Affected pkg:deb/ubuntu/linux-image-3.13.0-100-generic-lpae?distro=trusty ubuntu linux-image-3.13.0-100-generic-lpae < 3.13.0-100.147 trusty
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...