[USN-4580-1] Linux kernel vulnerability
Severity
High
Affected Packages
49
CVEs
1
The system could be made to crash or possibly run programs as an administrator.
Hadar Manor discovered that the DCCP protocol implementation in the Linux
kernel improperly handled socket reuse, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.
- ID
- USN-4580-1
- Severity
- high
- URL
- https://ubuntu.com/security/notices/USN-4580-1
- Published
-
2020-10-14T02:24:44
(3 years ago) - Modified
-
2020-10-14T02:24:44
(3 years ago) - Other Advisories
-
- ALAS-2021-1539
- ALAS2-2021-1712
- DSA-4978-1
- ELSA-2021-9486
- ELSA-2021-9487
- FEDORA-2020-ad980d282f
- FEDORA-2020-ce117eff51
- FEDORA-2020-e288acda9a
- SUSE-SU-2022:3609-1
- SUSE-SU-2022:3704-1
- SUSE-SU-2022:3775-1
- SUSE-SU-2022:3809-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:0416-1
- USN-4576-1
- USN-4577-1
- USN-4578-1
- USN-4579-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-virtual?distro=trusty | ubuntu | linux-image-virtual | < 3.13.0.182.191 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-virtual?distro=precise | ubuntu | linux-image-virtual | < 3.2.0.149.163 | precise | ||
Affected | pkg:deb/ubuntu/linux-image-server?distro=trusty | ubuntu | linux-image-server | < 3.13.0.182.191 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-server?distro=precise | ubuntu | linux-image-server | < 3.2.0.149.163 | precise | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc?distro=precise | ubuntu | linux-image-powerpc | < 3.2.0.149.163 | precise | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp?distro=trusty | ubuntu | linux-image-powerpc64-smp | < 3.13.0.182.191 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp?distro=precise | ubuntu | linux-image-powerpc64-smp | < 3.2.0.149.163 | precise | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb?distro=trusty | ubuntu | linux-image-powerpc64-emb | < 3.13.0.182.191 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp?distro=trusty | ubuntu | linux-image-powerpc-smp | < 3.13.0.182.191 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp?distro=precise | ubuntu | linux-image-powerpc-smp | < 3.2.0.149.163 | precise | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc?distro=trusty | ubuntu | linux-image-powerpc-e500mc | < 3.13.0.182.191 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500?distro=trusty | ubuntu | linux-image-powerpc-e500 | < 3.13.0.182.191 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-omap?distro=trusty | ubuntu | linux-image-omap | < 3.13.0.182.191 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-omap?distro=precise | ubuntu | linux-image-omap | < 3.2.0.149.163 | precise | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency?distro=trusty | ubuntu | linux-image-lowlatency | < 3.13.0.182.191 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-pae?distro=trusty | ubuntu | linux-image-lowlatency-pae | < 3.13.0.182.191 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-highbank?distro=trusty | ubuntu | linux-image-highbank | < 3.13.0.182.191 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-highbank?distro=precise | ubuntu | linux-image-highbank | < 3.2.0.149.163 | precise | ||
Affected | pkg:deb/ubuntu/linux-image-generic?distro=trusty | ubuntu | linux-image-generic | < 3.13.0.182.191 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic?distro=precise | ubuntu | linux-image-generic | < 3.2.0.149.163 | precise | ||
Affected | pkg:deb/ubuntu/linux-image-generic-pae?distro=trusty | ubuntu | linux-image-generic-pae | < 3.13.0.182.191 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-pae?distro=precise | ubuntu | linux-image-generic-pae | < 3.2.0.149.163 | precise | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-trusty?distro=trusty | ubuntu | linux-image-generic-lts-trusty | < 3.13.0.182.191 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-trusty?distro=precise | ubuntu | linux-image-generic-lts-trusty | < 3.13.0.182.168 | precise | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-saucy?distro=trusty | ubuntu | linux-image-generic-lts-saucy | < 3.13.0.182.191 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-raring?distro=trusty | ubuntu | linux-image-generic-lts-raring | < 3.13.0.182.191 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-quantal?distro=trusty | ubuntu | linux-image-generic-lts-quantal | < 3.13.0.182.191 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae?distro=trusty | ubuntu | linux-image-generic-lpae | < 3.13.0.182.191 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-trusty?distro=trusty | ubuntu | linux-image-generic-lpae-lts-trusty | < 3.13.0.182.191 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-trusty?distro=precise | ubuntu | linux-image-generic-lpae-lts-trusty | < 3.13.0.182.168 | precise | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-saucy?distro=trusty | ubuntu | linux-image-generic-lpae-lts-saucy | < 3.13.0.182.191 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.2.0-149-virtual?distro=precise | ubuntu | linux-image-3.2.0-149-virtual | < 3.2.0-149.196 | precise | ||
Affected | pkg:deb/ubuntu/linux-image-3.2.0-149-powerpc64-smp?distro=precise | ubuntu | linux-image-3.2.0-149-powerpc64-smp | < 3.2.0-149.196 | precise | ||
Affected | pkg:deb/ubuntu/linux-image-3.2.0-149-powerpc-smp?distro=precise | ubuntu | linux-image-3.2.0-149-powerpc-smp | < 3.2.0-149.196 | precise | ||
Affected | pkg:deb/ubuntu/linux-image-3.2.0-149-omap?distro=precise | ubuntu | linux-image-3.2.0-149-omap | < 3.2.0-149.196 | precise | ||
Affected | pkg:deb/ubuntu/linux-image-3.2.0-149-highbank?distro=precise | ubuntu | linux-image-3.2.0-149-highbank | < 3.2.0-149.196 | precise | ||
Affected | pkg:deb/ubuntu/linux-image-3.2.0-149-generic?distro=precise | ubuntu | linux-image-3.2.0-149-generic | < 3.2.0-149.196 | precise | ||
Affected | pkg:deb/ubuntu/linux-image-3.2.0-149-generic-pae?distro=precise | ubuntu | linux-image-3.2.0-149-generic-pae | < 3.2.0-149.196 | precise | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-182-powerpc64-smp?distro=trusty | ubuntu | linux-image-3.13.0-182-powerpc64-smp | < 3.13.0-182.233 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-182-powerpc64-emb?distro=trusty | ubuntu | linux-image-3.13.0-182-powerpc64-emb | < 3.13.0-182.233 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-182-powerpc-smp?distro=trusty | ubuntu | linux-image-3.13.0-182-powerpc-smp | < 3.13.0-182.233 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-182-powerpc-e500mc?distro=trusty | ubuntu | linux-image-3.13.0-182-powerpc-e500mc | < 3.13.0-182.233 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-182-powerpc-e500?distro=trusty | ubuntu | linux-image-3.13.0-182-powerpc-e500 | < 3.13.0-182.233 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-182-lowlatency?distro=trusty | ubuntu | linux-image-3.13.0-182-lowlatency | < 3.13.0-182.233 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-182-lowlatency?distro=precise | ubuntu | linux-image-3.13.0-182-lowlatency | < 3.13.0-182.233~12.04.1 | precise | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-182-generic?distro=trusty | ubuntu | linux-image-3.13.0-182-generic | < 3.13.0-182.233 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-182-generic?distro=precise | ubuntu | linux-image-3.13.0-182-generic | < 3.13.0-182.233~12.04.1 | precise | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-182-generic-lpae?distro=trusty | ubuntu | linux-image-3.13.0-182-generic-lpae | < 3.13.0-182.233 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-182-generic-lpae?distro=precise | ubuntu | linux-image-3.13.0-182-generic-lpae | < 3.13.0-182.233~12.04.1 | precise |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |