[USN-4713-2] Linux kernel vulnerability
Severity
High
Affected Packages
37
CVEs
1
The system could allow unintended access to data in some environments.
It was discovered that the LIO SCSI target implementation in the Linux
kernel performed insufficient identifier checking in certain XCOPY
requests. An attacker with access to at least one LUN in a multiple
backstore environment could use this to expose sensitive information or
modify data.
- ID
- USN-4713-2
- Severity
- high
- URL
- https://ubuntu.com/security/notices/USN-4713-2
- Published
-
2021-02-10T01:17:36
(3 years ago) - Modified
-
2021-02-10T01:17:36
(3 years ago) - Other Advisories
-
- ALAS-2021-1480
- ALAS2-2021-1600
- ALSA-2021:1093
- ASA-202101-30
- ASA-202101-31
- ASA-202101-32
- ASA-202101-33
- DSA-4843-1
- ELSA-2021-0856
- ELSA-2021-1093
- ELSA-2021-9005
- ELSA-2021-9006
- ELSA-2021-9007
- ELSA-2021-9008
- ELSA-2021-9009
- ELSA-2021-9023
- ELSA-2021-9024
- ELSA-2021-9025
- ELSA-2021-9035
- ELSA-2021-9037
- ELSA-2021-9038
- ELSA-2021-9039
- ELSA-2021-9306
- ELSA-2021-9307
- FEDORA-2021-082e638d02
- FEDORA-2021-4a91649cf3
- FEDORA-2021-620fb40359
- MS:CVE-2020-28374
- openSUSE-SU-2021:0060-1
- openSUSE-SU-2021:0075-1
- RHSA-2021:0856
- RHSA-2021:0857
- RHSA-2021:0862
- RHSA-2021:1081
- RHSA-2021:1093
- SUSE-SU-2021:0117-1
- SUSE-SU-2021:0118-1
- SUSE-SU-2021:0133-1
- SUSE-SU-2021:0347-1
- SUSE-SU-2021:0348-1
- SUSE-SU-2021:0427-1
- SUSE-SU-2021:0433-1
- SUSE-SU-2021:0434-1
- SUSE-SU-2021:0438-1
- SUSE-SU-2021:0743-1
- SUSE-SU-2021:0744-1
- SUSE-SU-2021:0818-1
- SUSE-SU-2021:0823-1
- SUSE-SU-2021:0826-1
- SUSE-SU-2021:0835-1
- SUSE-SU-2021:0841-1
- SUSE-SU-2021:0842-1
- SUSE-SU-2021:0849-1
- SUSE-SU-2021:0853-1
- SUSE-SU-2021:0859-1
- SUSE-SU-2021:0868-1
- SUSE-SU-2021:0870-1
- USN-4694-1
- USN-4709-1
- USN-4711-1
- USN-4713-1
- USN-4753-1
- USN-4901-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-virtual?distro=trusty | ubuntu | linux-image-virtual | < 3.13.0.184.193 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-server?distro=trusty | ubuntu | linux-image-server | < 3.13.0.184.193 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-raspi2-hwe-18.04?distro=bionic | ubuntu | linux-image-raspi2-hwe-18.04 | < 5.3.0.1037.26 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp?distro=trusty | ubuntu | linux-image-powerpc64-smp | < 3.13.0.184.193 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb?distro=trusty | ubuntu | linux-image-powerpc64-emb | < 3.13.0.184.193 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp?distro=trusty | ubuntu | linux-image-powerpc-smp | < 3.13.0.184.193 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc?distro=trusty | ubuntu | linux-image-powerpc-e500mc | < 3.13.0.184.193 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500?distro=trusty | ubuntu | linux-image-powerpc-e500 | < 3.13.0.184.193 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-omap?distro=trusty | ubuntu | linux-image-omap | < 3.13.0.184.193 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency?distro=trusty | ubuntu | linux-image-lowlatency | < 3.13.0.184.193 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-pae?distro=trusty | ubuntu | linux-image-lowlatency-pae | < 3.13.0.184.193 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-highbank?distro=trusty | ubuntu | linux-image-highbank | < 3.13.0.184.193 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-gkeop-5.3?distro=bionic | ubuntu | linux-image-gkeop-5.3 | < 5.3.0.70.127 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-gke-5.3?distro=bionic | ubuntu | linux-image-gke-5.3 | < 5.3.0.1040.23 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-gke-5.0?distro=bionic | ubuntu | linux-image-gke-5.0 | < 5.0.0.1051.35 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic?distro=trusty | ubuntu | linux-image-generic | < 3.13.0.184.193 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-pae?distro=trusty | ubuntu | linux-image-generic-pae | < 3.13.0.184.193 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-trusty?distro=trusty | ubuntu | linux-image-generic-lts-trusty | < 3.13.0.184.193 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-saucy?distro=trusty | ubuntu | linux-image-generic-lts-saucy | < 3.13.0.184.193 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-raring?distro=trusty | ubuntu | linux-image-generic-lts-raring | < 3.13.0.184.193 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-quantal?distro=trusty | ubuntu | linux-image-generic-lts-quantal | < 3.13.0.184.193 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae?distro=trusty | ubuntu | linux-image-generic-lpae | < 3.13.0.184.193 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-trusty?distro=trusty | ubuntu | linux-image-generic-lpae-lts-trusty | < 3.13.0.184.193 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-saucy?distro=trusty | ubuntu | linux-image-generic-lpae-lts-saucy | < 3.13.0.184.193 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-5.3.0-70-lowlatency?distro=bionic | ubuntu | linux-image-5.3.0-70-lowlatency | < 5.3.0-70.66 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-5.3.0-70-generic?distro=bionic | ubuntu | linux-image-5.3.0-70-generic | < 5.3.0-70.66 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-5.3.0-1040-gke?distro=bionic | ubuntu | linux-image-5.3.0-1040-gke | < 5.3.0-1040.43 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-5.3.0-1037-raspi2?distro=bionic | ubuntu | linux-image-5.3.0-1037-raspi2 | < 5.3.0-1037.39 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-5.0.0-1051-gke?distro=bionic | ubuntu | linux-image-5.0.0-1051-gke | < 5.0.0-1051.53 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-184-powerpc64-smp?distro=trusty | ubuntu | linux-image-3.13.0-184-powerpc64-smp | < 3.13.0-184.235 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-184-powerpc64-emb?distro=trusty | ubuntu | linux-image-3.13.0-184-powerpc64-emb | < 3.13.0-184.235 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-184-powerpc-smp?distro=trusty | ubuntu | linux-image-3.13.0-184-powerpc-smp | < 3.13.0-184.235 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-184-powerpc-e500mc?distro=trusty | ubuntu | linux-image-3.13.0-184-powerpc-e500mc | < 3.13.0-184.235 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-184-powerpc-e500?distro=trusty | ubuntu | linux-image-3.13.0-184-powerpc-e500 | < 3.13.0-184.235 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-184-lowlatency?distro=trusty | ubuntu | linux-image-3.13.0-184-lowlatency | < 3.13.0-184.235 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-184-generic?distro=trusty | ubuntu | linux-image-3.13.0-184-generic | < 3.13.0-184.235 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-184-generic-lpae?distro=trusty | ubuntu | linux-image-3.13.0-184-generic-lpae | < 3.13.0-184.235 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |