[USN-4007-1] Linux kernel vulnerability
Severity
Negligible
Affected Packages
29
CVEs
1
A system hardening measure could be bypassed.
Federico Manuel Bento discovered that the Linux kernel did not properly
apply Address Space Layout Randomization (ASLR) in some situations for
setuid a.out binaries. A local attacker could use this to improve the
chances of exploiting an existing vulnerability in a setuid a.out binary.
As a hardening measure, this update disables a.out support.
- ID
- USN-4007-1
- Severity
- negligible
- URL
- https://ubuntu.com/security/notices/USN-4007-1
- Published
-
2019-06-04T22:50:15
(5 years ago) - Modified
-
2019-06-04T22:50:15
(5 years ago) - Other Advisories
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-virtual?distro=bionic | ubuntu | linux-image-virtual | < 4.15.0.51.53 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-hwe-16.04?distro=bionic | ubuntu | linux-image-virtual-hwe-16.04 | < 4.15.0.51.53 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-hwe-16.04-edge?distro=bionic | ubuntu | linux-image-virtual-hwe-16.04-edge | < 4.15.0.51.53 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-snapdragon?distro=bionic | ubuntu | linux-image-snapdragon | < 4.15.0.1054.57 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-raspi2?distro=bionic | ubuntu | linux-image-raspi2 | < 4.15.0.1037.35 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-oracle?distro=bionic | ubuntu | linux-image-oracle | < 4.15.0.1014.17 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-oem?distro=bionic | ubuntu | linux-image-oem | < 4.15.0.1039.43 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency?distro=bionic | ubuntu | linux-image-lowlatency | < 4.15.0.51.53 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04?distro=bionic | ubuntu | linux-image-lowlatency-hwe-16.04 | < 4.15.0.51.53 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04-edge?distro=bionic | ubuntu | linux-image-lowlatency-hwe-16.04-edge | < 4.15.0.51.53 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-kvm?distro=bionic | ubuntu | linux-image-kvm | < 4.15.0.1035.35 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic?distro=bionic | ubuntu | linux-image-generic | < 4.15.0.51.53 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae?distro=bionic | ubuntu | linux-image-generic-lpae | < 4.15.0.51.53 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-hwe-16.04?distro=bionic | ubuntu | linux-image-generic-lpae-hwe-16.04 | < 4.15.0.51.53 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-hwe-16.04-edge?distro=bionic | ubuntu | linux-image-generic-lpae-hwe-16.04-edge | < 4.15.0.51.53 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic-hwe-16.04?distro=bionic | ubuntu | linux-image-generic-hwe-16.04 | < 4.15.0.51.53 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic-hwe-16.04-edge?distro=bionic | ubuntu | linux-image-generic-hwe-16.04-edge | < 4.15.0.51.53 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-gcp?distro=bionic | ubuntu | linux-image-gcp | < 4.15.0.1033.35 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-aws?distro=bionic | ubuntu | linux-image-aws | < 4.15.0.1040.39 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-51-lowlatency?distro=bionic | ubuntu | linux-image-4.15.0-51-lowlatency | < 4.15.0-51.55 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-51-generic?distro=bionic | ubuntu | linux-image-4.15.0-51-generic | < 4.15.0-51.55 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-51-generic-lpae?distro=bionic | ubuntu | linux-image-4.15.0-51-generic-lpae | < 4.15.0-51.55 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1054-snapdragon?distro=bionic | ubuntu | linux-image-4.15.0-1054-snapdragon | < 4.15.0-1054.58 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1040-aws?distro=bionic | ubuntu | linux-image-4.15.0-1040-aws | < 4.15.0-1040.42 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1039-oem?distro=bionic | ubuntu | linux-image-4.15.0-1039-oem | < 4.15.0-1039.44 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1037-raspi2?distro=bionic | ubuntu | linux-image-4.15.0-1037-raspi2 | < 4.15.0-1037.39 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1035-kvm?distro=bionic | ubuntu | linux-image-4.15.0-1035-kvm | < 4.15.0-1035.35 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1033-gcp?distro=bionic | ubuntu | linux-image-4.15.0-1033-gcp | < 4.15.0-1033.35 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1014-oracle?distro=bionic | ubuntu | linux-image-4.15.0-1014-oracle | < 4.15.0-1014.16 | bionic |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |