Executive Summary
Summary | |
---|---|
Title | Linux kernel vulnerabilities |
Informations | |||
---|---|---|---|
Name | USN-2283-1 | First vendor Publication | 2014-07-16 |
Vendor | Ubuntu | Last vendor Modification | 2014-07-16 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 6.9 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 3.4 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 LTS Summary: Several security issues were fixed in the kernel. Software Description: - linux: Linux kernel Details: Sasha Levin reported a flaw in the Linux kernel's point-to-point protocol (PPP) when used with the Layer Two Tunneling Protocol (L2TP). A local user could exploit this flaw to gain administrative privileges. (CVE-2014-4943) Michael S. Tsirkin discovered an information leak in the Linux kernel's segmentation of skbs when using the zerocopy feature of vhost-net. A local attacker could exploit this flaw to gain potentially sensitive information from kernel memory. (CVE-2014-0131) Don Bailey discovered a flaw in the LZO decompress algorithm used by the Linux kernel. An attacker could exploit this flaw to cause a denial of service (memory corruption or OOPS). (CVE-2014-4608) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 LTS: After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. If you use linux-restricted-modules, you have to update that package as well to get modules which work with the new kernel version. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-server, linux-powerpc), a standard system upgrade will automatically perform this as well. References: Package Information: |
Original Source
Url : http://www.ubuntu.com/usn/USN-2283-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
33 % | CWE-416 | Use After Free |
33 % | CWE-269 | Improper Privilege Management |
33 % | CWE-190 | Integer Overflow or Wraparound (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:24485 | |||
Oval ID: | oval:org.mitre.oval:def:24485 | ||
Title: | RHSA-2014:0923: kernel security update (Important) | ||
Description: | The kernel packages contain the Linux kernel, the core of any Linux operating system. * It was found that the Linux kernel's ptrace subsystem allowed a traced process' instruction pointer to be set to a non-canonical memory address without forcing the non-sysret code path when returning to user space. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2014-4699, Important) Note: The CVE-2014-4699 issue only affected systems using an Intel CPU. * A flaw was found in the way the pppol2tp_setsockopt() and pppol2tp_getsockopt() functions in the Linux kernel's PPP over L2TP implementation handled requests with a non-SOL_PPPOL2TP socket option level. A local, unprivileged user could use this flaw to escalate their privileges on the system. (CVE-2014-4943, Important) Red Hat would like to thank Andy Lutomirski for reporting CVE-2014-4699, and Sasha Levin for reporting CVE-2014-4943. All kernel users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2014:0923-00 CESA-2014:0923 CVE-2014-4699 CVE-2014-4943 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 7 CentOS Linux 7 | Product(s): | kernel |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:24968 | |||
Oval ID: | oval:org.mitre.oval:def:24968 | ||
Title: | USN-2286-1 -- linux-lts-raring vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2286-1 CVE-2014-4943 CVE-2014-0131 CVE-2014-1739 CVE-2014-3144 CVE-2014-3145 CVE-2014-3917 CVE-2014-4014 CVE-2014-4608 | Version: | 3 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-raring |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:25055 | |||
Oval ID: | oval:org.mitre.oval:def:25055 | ||
Title: | USN-2284-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2284-1 CVE-2014-4943 CVE-2014-0131 CVE-2014-4608 | Version: | 3 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:25118 | |||
Oval ID: | oval:org.mitre.oval:def:25118 | ||
Title: | USN-2285-1 -- linux-lts-quantal vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2285-1 CVE-2014-4943 CVE-2014-0131 CVE-2014-1739 CVE-2014-3917 CVE-2014-4014 CVE-2014-4027 CVE-2014-4608 | Version: | 3 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-quantal |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:25123 | |||
Oval ID: | oval:org.mitre.oval:def:25123 | ||
Title: | USN-2281-1 -- linux-ec2 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2281-1 CVE-2014-4943 CVE-2014-3917 CVE-2014-4608 | Version: | 3 |
Platform(s): | Ubuntu 10.04 | Product(s): | linux-ec2 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:25252 | |||
Oval ID: | oval:org.mitre.oval:def:25252 | ||
Title: | USN-2283-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2283-1 CVE-2014-4943 CVE-2014-0131 CVE-2014-4608 | Version: | 3 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:25359 | |||
Oval ID: | oval:org.mitre.oval:def:25359 | ||
Title: | RHSA-2014:0924: kernel security update (Important) | ||
Description: | The kernel packages contain the Linux kernel, the core of any Linux operating system. * It was found that the Linux kernel's ptrace subsystem allowed a traced process' instruction pointer to be set to a non-canonical memory address without forcing the non-sysret code path when returning to user space. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2014-4699, Important) Note: The CVE-2014-4699 issue only affected systems using an Intel CPU. * A flaw was found in the way the pppol2tp_setsockopt() and pppol2tp_getsockopt() functions in the Linux kernel's PPP over L2TP implementation handled requests with a non-SOL_PPPOL2TP socket option level. A local, unprivileged user could use this flaw to escalate their privileges on the system. (CVE-2014-4943, Important) Red Hat would like to thank Andy Lutomirski for reporting CVE-2014-4699, and Sasha Levin for reporting CVE-2014-4943. All kernel users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2014:0924-00 CESA-2014:0924 CVE-2014-4699 CVE-2014-4943 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 6 CentOS Linux 6 | Product(s): | kernel |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26193 | |||
Oval ID: | oval:org.mitre.oval:def:26193 | ||
Title: | DSA-2992-1 -- linux - security update | ||
Description: | Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2992-1 CVE-2014-3534 CVE-2014-4667 CVE-2014-4943 | Version: | 5 |
Platform(s): | Debian GNU/Linux 7 Debian GNU/kFreeBSD 7 | Product(s): | linux |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-04-03 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2017-0057.nasl - Type : ACT_GATHER_INFO |
2015-09-18 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL15699.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-0481-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-1138-1.nasl - Type : ACT_GATHER_INFO |
2015-03-26 | Name : The remote Debian host is missing a security update. File : debian_DLA-103.nasl - Type : ACT_GATHER_INFO |
2015-03-24 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-150306.nasl - Type : ACT_GATHER_INFO |
2015-03-13 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2015-0290.nasl - Type : ACT_GATHER_INFO |
2015-01-21 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2015-0062.nasl - Type : ACT_GATHER_INFO |
2014-12-26 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-141217.nasl - Type : ACT_GATHER_INFO |
2014-12-26 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-141202.nasl - Type : ACT_GATHER_INFO |
2014-12-22 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-793.nasl - Type : ACT_GATHER_INFO |
2014-12-22 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-791.nasl - Type : ACT_GATHER_INFO |
2014-11-25 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2419-1.nasl - Type : ACT_GATHER_INFO |
2014-11-25 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2416-1.nasl - Type : ACT_GATHER_INFO |
2014-11-25 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2417-1.nasl - Type : ACT_GATHER_INFO |
2014-11-25 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2420-1.nasl - Type : ACT_GATHER_INFO |
2014-11-25 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2421-1.nasl - Type : ACT_GATHER_INFO |
2014-11-12 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-1392.nasl - Type : ACT_GATHER_INFO |
2014-11-11 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1025.nasl - Type : ACT_GATHER_INFO |
2014-11-11 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0925.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2014-0979.nasl - Type : ACT_GATHER_INFO |
2014-11-04 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20141014_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2014-10-23 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-bigsmp-201409-140924.nasl - Type : ACT_GATHER_INFO |
2014-10-23 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-140924.nasl - Type : ACT_GATHER_INFO |
2014-10-22 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-1392.nasl - Type : ACT_GATHER_INFO |
2014-10-14 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1392.nasl - Type : ACT_GATHER_INFO |
2014-10-12 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2014-368.nasl - Type : ACT_GATHER_INFO |
2014-08-23 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3070.nasl - Type : ACT_GATHER_INFO |
2014-08-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-493.nasl - Type : ACT_GATHER_INFO |
2014-08-08 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2014-155.nasl - Type : ACT_GATHER_INFO |
2014-08-04 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-478.nasl - Type : ACT_GATHER_INFO |
2014-07-30 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0923.nasl - Type : ACT_GATHER_INFO |
2014-07-30 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2992.nasl - Type : ACT_GATHER_INFO |
2014-07-26 | Name : The remote Fedora host is missing a security update. File : fedora_2014-8487.nasl - Type : ACT_GATHER_INFO |
2014-07-26 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-0924.nasl - Type : ACT_GATHER_INFO |
2014-07-26 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-0923.nasl - Type : ACT_GATHER_INFO |
2014-07-25 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140723_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2014-07-25 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3049.nasl - Type : ACT_GATHER_INFO |
2014-07-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0924.nasl - Type : ACT_GATHER_INFO |
2014-07-24 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-0924.nasl - Type : ACT_GATHER_INFO |
2014-07-24 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-0923.nasl - Type : ACT_GATHER_INFO |
2014-07-21 | Name : The remote Fedora host is missing a security update. File : fedora_2014-8519.nasl - Type : ACT_GATHER_INFO |
2014-07-20 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3047.nasl - Type : ACT_GATHER_INFO |
2014-07-20 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3046.nasl - Type : ACT_GATHER_INFO |
2014-07-20 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3048.nasl - Type : ACT_GATHER_INFO |
2014-07-17 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2290-1.nasl - Type : ACT_GATHER_INFO |
2014-07-17 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2289-1.nasl - Type : ACT_GATHER_INFO |
2014-07-17 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2288-1.nasl - Type : ACT_GATHER_INFO |
2014-07-17 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2287-1.nasl - Type : ACT_GATHER_INFO |
2014-07-17 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2286-1.nasl - Type : ACT_GATHER_INFO |
2014-07-17 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2285-1.nasl - Type : ACT_GATHER_INFO |
2014-07-17 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2283-1.nasl - Type : ACT_GATHER_INFO |
2014-07-17 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2282-1.nasl - Type : ACT_GATHER_INFO |
2014-07-17 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2281-1.nasl - Type : ACT_GATHER_INFO |
2014-07-17 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-140709.nasl - Type : ACT_GATHER_INFO |
2014-07-01 | Name : The remote Fedora host is missing a security update. File : fedora_2014-7863.nasl - Type : ACT_GATHER_INFO |
2014-06-27 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_d1f5e12afd5a11e3a108080027ef73ec.nasl - Type : ACT_GATHER_INFO |
2014-03-28 | Name : The remote Fedora host is missing a security update. File : fedora_2014-4317.nasl - Type : ACT_GATHER_INFO |
2014-03-28 | Name : The remote Fedora host is missing a security update. File : fedora_2014-4360.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-07-24 00:27:09 |
|
2014-07-20 00:25:54 |
|
2014-07-18 13:24:38 |
|
2014-07-17 05:22:42 |
|