[USN-3908-1] Linux kernel vulnerability
Severity
Medium
Affected Packages
27
CVEs
1
The system could be made to run programs as an administrator.
Jann Horn discovered a race condition in the fork() system call in the
Linux kernel. A local attacker could use this to gain access to services
that cache authorizations.
- ID
- USN-3908-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-3908-1
- Published
-
2019-03-12T21:40:38
(5 years ago) - Modified
-
2019-03-12T21:40:38
(5 years ago) - Other Advisories
-
- ALAS2-2019-1171
- ALPINE:CVE-2019-6133
- ELSA-2019-0230
- ELSA-2019-0420
- ELSA-2019-4708
- ELSA-2019-4710
- openSUSE-SU-2019:1914-1
- RHSA-2019:0230
- RHSA-2019:0420
- SUSE-SU-2019:2018-1
- SUSE-SU-2019:2035-1
- SUSE-SU-2019:2035-2
- SUSE-SU-2020:3503-1
- SUSE-SU-2021:0437-1
- USN-3901-1
- USN-3901-2
- USN-3903-1
- USN-3903-2
- USN-3908-2
- USN-3910-1
- USN-3910-2
- USN-3934-1
- USN-3934-2
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-virtual?distro=trusty | ubuntu | linux-image-virtual | < 3.13.0.166.177 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp?distro=trusty | ubuntu | linux-image-powerpc64-smp | < 3.13.0.166.177 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb?distro=trusty | ubuntu | linux-image-powerpc64-emb | < 3.13.0.166.177 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp?distro=trusty | ubuntu | linux-image-powerpc-smp | < 3.13.0.166.177 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc?distro=trusty | ubuntu | linux-image-powerpc-e500mc | < 3.13.0.166.177 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500?distro=trusty | ubuntu | linux-image-powerpc-e500 | < 3.13.0.166.177 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-omap?distro=trusty | ubuntu | linux-image-omap | < 3.13.0.166.177 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency?distro=trusty | ubuntu | linux-image-lowlatency | < 3.13.0.166.177 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-pae?distro=trusty | ubuntu | linux-image-lowlatency-pae | < 3.13.0.166.177 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-highbank?distro=trusty | ubuntu | linux-image-highbank | < 3.13.0.166.177 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic?distro=trusty | ubuntu | linux-image-generic | < 3.13.0.166.177 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-pae?distro=trusty | ubuntu | linux-image-generic-pae | < 3.13.0.166.177 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-trusty?distro=trusty | ubuntu | linux-image-generic-lts-trusty | < 3.13.0.166.177 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-saucy?distro=trusty | ubuntu | linux-image-generic-lts-saucy | < 3.13.0.166.177 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-raring?distro=trusty | ubuntu | linux-image-generic-lts-raring | < 3.13.0.166.177 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-quantal?distro=trusty | ubuntu | linux-image-generic-lts-quantal | < 3.13.0.166.177 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae?distro=trusty | ubuntu | linux-image-generic-lpae | < 3.13.0.166.177 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-trusty?distro=trusty | ubuntu | linux-image-generic-lpae-lts-trusty | < 3.13.0.166.177 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-saucy?distro=trusty | ubuntu | linux-image-generic-lpae-lts-saucy | < 3.13.0.166.177 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-166-powerpc64-smp?distro=trusty | ubuntu | linux-image-3.13.0-166-powerpc64-smp | < 3.13.0-166.216 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-166-powerpc64-emb?distro=trusty | ubuntu | linux-image-3.13.0-166-powerpc64-emb | < 3.13.0-166.216 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-166-powerpc-smp?distro=trusty | ubuntu | linux-image-3.13.0-166-powerpc-smp | < 3.13.0-166.216 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-166-powerpc-e500mc?distro=trusty | ubuntu | linux-image-3.13.0-166-powerpc-e500mc | < 3.13.0-166.216 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-166-powerpc-e500?distro=trusty | ubuntu | linux-image-3.13.0-166-powerpc-e500 | < 3.13.0-166.216 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-166-lowlatency?distro=trusty | ubuntu | linux-image-3.13.0-166-lowlatency | < 3.13.0-166.216 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-166-generic?distro=trusty | ubuntu | linux-image-3.13.0-166-generic | < 3.13.0-166.216 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-166-generic-lpae?distro=trusty | ubuntu | linux-image-3.13.0-166-generic-lpae | < 3.13.0-166.216 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |