Executive Summary
Summary | |
---|---|
Title | Linux kernel vulnerabilities |
Informations | |||
---|---|---|---|
Name | USN-2140-1 | First vendor Publication | 2014-03-07 |
Vendor | Ubuntu | Last vendor Modification | 2014-03-07 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:M/Au:S/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 4.4 | Attack Range | Local |
Cvss Impact Score | 6.9 | Attack Complexity | Medium |
Cvss Expoit Score | 2.7 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 13.10 Summary: Several security issues were fixed in the kernel. Software Description: - linux: Linux kernel Details: An information leak was discovered in the Linux kernel when built with the NetFilter Connection Tracking (NF_CONNTRACK) support for IRC protocol (NF_NAT_IRC). A remote attacker could exploit this flaw to obtain potentially sensitive kernel information when communicating over a client- to-client IRC connection(/dcc) via a NAT-ed network. (CVE-2014-1690) Matthew Thode reported a denial of service vulnerability in the Linux kernel when SELinux support is enabled. A local user with the CAP_MAC_ADMIN capability (and the SELinux mac_admin permission if running in enforcing mode) could exploit this flaw to cause a denial of service (kernel crash). (CVE-2014-1874) An information leak was discovered in the Linux kernel's NFS filesystem. A local users with write access to an NFS share could exploit this flaw to obtain potential sensative information from kernel memory. (CVE-2014-2038) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 13.10: After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. If you use linux-restricted-modules, you have to update that package as well to get modules which work with the new kernel version. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-server, linux-powerpc), a standard system upgrade will automatically perform this as well. References: Package Information: |
Original Source
Url : http://www.ubuntu.com/usn/USN-2140-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
67 % | CWE-200 | Information Exposure |
33 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:24001 | |||
Oval ID: | oval:org.mitre.oval:def:24001 | ||
Title: | USN-2158-1 -- linux-lts-raring vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2158-1 CVE-2013-4345 CVE-2013-6382 CVE-2014-1690 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-raring |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:24004 | |||
Oval ID: | oval:org.mitre.oval:def:24004 | ||
Title: | USN-2137-1 -- linux-lts-saucy vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2137-1 CVE-2014-1690 CVE-2014-1874 CVE-2014-2038 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-saucy |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:24074 | |||
Oval ID: | oval:org.mitre.oval:def:24074 | ||
Title: | USN-2135-1 -- linux-lts-quantal vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2135-1 CVE-2013-4579 CVE-2013-4587 CVE-2013-6367 CVE-2013-6368 CVE-2013-6382 CVE-2013-7263 CVE-2013-7264 CVE-2013-7265 CVE-2013-7266 CVE-2013-7267 CVE-2013-7268 CVE-2013-7269 CVE-2013-7270 CVE-2013-7271 CVE-2013-7281 CVE-2014-1438 CVE-2014-1446 CVE-2014-1874 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-quantal |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:24102 | |||
Oval ID: | oval:org.mitre.oval:def:24102 | ||
Title: | USN-2134-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2134-1 CVE-2013-4579 CVE-2013-6368 CVE-2014-1438 CVE-2014-1446 CVE-2014-1874 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:24233 | |||
Oval ID: | oval:org.mitre.oval:def:24233 | ||
Title: | USN-2136-1 -- linux-lts-raring vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2136-1 CVE-2013-4579 CVE-2013-4587 CVE-2013-6367 CVE-2013-6368 CVE-2013-6376 CVE-2013-6380 CVE-2013-7263 CVE-2013-7264 CVE-2013-7265 CVE-2013-7266 CVE-2013-7267 CVE-2013-7268 CVE-2013-7269 CVE-2013-7270 CVE-2013-7271 CVE-2013-7281 CVE-2014-1438 CVE-2014-1446 CVE-2014-1874 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-raring |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:24263 | |||
Oval ID: | oval:org.mitre.oval:def:24263 | ||
Title: | USN-2140-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2140-1 CVE-2014-1690 CVE-2014-1874 CVE-2014-2038 | Version: | 5 |
Platform(s): | Ubuntu 13.10 | Product(s): | linux |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:24316 | |||
Oval ID: | oval:org.mitre.oval:def:24316 | ||
Title: | USN-2138-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2138-1 CVE-2013-4579 CVE-2013-4587 CVE-2013-6367 CVE-2013-6368 CVE-2013-6382 CVE-2013-7263 CVE-2013-7264 CVE-2013-7265 CVE-2013-7266 CVE-2013-7267 CVE-2013-7268 CVE-2013-7269 CVE-2013-7270 CVE-2013-7271 CVE-2013-7281 CVE-2014-1438 CVE-2014-1446 CVE-2014-1874 | Version: | 5 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:24394 | |||
Oval ID: | oval:org.mitre.oval:def:24394 | ||
Title: | USN-2139-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2139-1 CVE-2013-4579 CVE-2013-4587 CVE-2013-6367 CVE-2013-6368 CVE-2013-6382 CVE-2013-7263 CVE-2013-7264 CVE-2013-7265 CVE-2013-7266 CVE-2013-7267 CVE-2013-7268 CVE-2013-7269 CVE-2013-7270 CVE-2013-7271 CVE-2013-7281 CVE-2014-1438 CVE-2014-1446 CVE-2014-1874 | Version: | 5 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:24395 | |||
Oval ID: | oval:org.mitre.oval:def:24395 | ||
Title: | USN-2133-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2133-1 CVE-2013-4579 CVE-2013-6368 CVE-2014-1438 CVE-2014-1446 CVE-2014-1874 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:24404 | |||
Oval ID: | oval:org.mitre.oval:def:24404 | ||
Title: | USN-2141-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2141-1 CVE-2013-4579 CVE-2013-4587 CVE-2013-6367 CVE-2013-6368 CVE-2013-6382 CVE-2013-7263 CVE-2013-7264 CVE-2013-7265 CVE-2013-7266 CVE-2013-7267 CVE-2013-7268 CVE-2013-7269 CVE-2013-7270 CVE-2013-7271 CVE-2013-7281 CVE-2014-1438 CVE-2014-1446 CVE-2014-1874 | Version: | 5 |
Platform(s): | Ubuntu 13.10 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:24423 | |||
Oval ID: | oval:org.mitre.oval:def:24423 | ||
Title: | USN-2129-1 -- linux-ec2 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2129-1 CVE-2013-0160 CVE-2013-2929 CVE-2013-4587 CVE-2013-6367 CVE-2013-6380 CVE-2013-6382 CVE-2013-7027 CVE-2013-7266 CVE-2013-7267 CVE-2013-7268 CVE-2013-7269 CVE-2013-7270 CVE-2013-7271 CVE-2014-1444 CVE-2014-1445 CVE-2014-1446 CVE-2014-1874 | Version: | 5 |
Platform(s): | Ubuntu 10.04 | Product(s): | linux-ec2 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:27042 | |||
Oval ID: | oval:org.mitre.oval:def:27042 | ||
Title: | ELSA-2014-3042 -- unbreakable enterprise kernel security update (important) | ||
Description: | [2.6.39-400.215.3] - SELinux: Fix kernel BUG on empty security contexts. (Stephen Smalley) [Orabug: 19028380] {CVE-2014-1874} - floppy: don't write kernel-only members to FDRAWCMD ioctl output (Matthew Daley) [Orabug: 19028444] {CVE-2014-1738} - floppy: ignore kernel-only members in FDRAWCMD ioctl input (Matthew Daley) [Orabug: 19028438] {CVE-2014-1737} - libertas: potential oops in debugfs (Dan Carpenter) [Orabug: 19028416] {CVE-2013-6378} | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014-3042 CVE-2014-1737 CVE-2014-1738 CVE-2013-6378 CVE-2014-1874 | Version: | 3 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | kernel-uek kernel-uek-debug kernel-uek-debug-devel kernel-uek-devel kernel-uek-doc kernel-uek-firmware |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27266 | |||
Oval ID: | oval:org.mitre.oval:def:27266 | ||
Title: | ELSA-2014-3070 -- Unbreakable Enterprise kernel security and bug fix update (important) | ||
Description: | kernel-uek [3.8.13-44] - net: Use netlink_ns_capable to verify the permisions of netlink messages (Eric W. Biederman) [Orabug: 19404229] {CVE-2014-0181} - net: Add variants of capable for use on netlink messages (Eric W. Biederman) [Orabug: 19404229] - net: Add variants of capable for use on on sockets (Eric W. Biederman) [Orabug: 19404229] - netlink: Rename netlink_capable netlink_allowed (Eric W. Biederman) [Orabug: 19404229] - sctp: Fix sk_ack_backlog wrap-around problem (Xufeng Zhang) [Orabug: 19404238] {CVE-2014-4667} - Revert 'xen/fb: allow xenfb initialization for hvm guests' (Vaughan Cao) [Orabug: 19320529] | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014-3070 CVE-2013-2930 CVE-2013-4579 CVE-2014-1690 | Version: | 5 |
Platform(s): | Oracle Linux 6 | Product(s): | dtrace-modules kernel-uek kernel-uek-debug kernel-uek-debug-devel kernel-uek-devel kernel-uek-doc kernel-uek-firmware |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-04-03 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2017-0057.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-0812-1.nasl - Type : ACT_GATHER_INFO |
2014-11-11 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2014-0815.nasl - Type : ACT_GATHER_INFO |
2014-08-23 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3070.nasl - Type : ACT_GATHER_INFO |
2014-07-22 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0439.nasl - Type : ACT_GATHER_INFO |
2014-07-17 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-140709.nasl - Type : ACT_GATHER_INFO |
2014-06-23 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3043.nasl - Type : ACT_GATHER_INFO |
2014-06-23 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3042.nasl - Type : ACT_GATHER_INFO |
2014-06-23 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-0771.nasl - Type : ACT_GATHER_INFO |
2014-06-20 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140619_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2014-06-20 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0771.nasl - Type : ACT_GATHER_INFO |
2014-06-20 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-0771.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2014-124.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-376.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-375.nasl - Type : ACT_GATHER_INFO |
2014-04-27 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2906.nasl - Type : ACT_GATHER_INFO |
2014-04-01 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2158-1.nasl - Type : ACT_GATHER_INFO |
2014-03-26 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0328.nasl - Type : ACT_GATHER_INFO |
2014-03-26 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-0328.nasl - Type : ACT_GATHER_INFO |
2014-03-26 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-0328.nasl - Type : ACT_GATHER_INFO |
2014-03-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2140-1.nasl - Type : ACT_GATHER_INFO |
2014-03-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2138-1.nasl - Type : ACT_GATHER_INFO |
2014-03-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2137-1.nasl - Type : ACT_GATHER_INFO |
2014-03-10 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2136-1.nasl - Type : ACT_GATHER_INFO |
2014-03-10 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2135-1.nasl - Type : ACT_GATHER_INFO |
2014-03-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2133-1.nasl - Type : ACT_GATHER_INFO |
2014-03-06 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2129-1.nasl - Type : ACT_GATHER_INFO |
2014-03-06 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2128-1.nasl - Type : ACT_GATHER_INFO |
2014-03-02 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2014-289.nasl - Type : ACT_GATHER_INFO |
2014-02-18 | Name : The remote Fedora host is missing a security update. File : fedora_2014-2576.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-03-11 13:21:28 |
|
2014-03-07 17:18:34 |
|