Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-4508

Опубликовано: 23 июн. 2014
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.7

Описание

arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000.

РелизСтатусПримечание
devel

not-affected

4.10.0-19.21
esm-infra-legacy/trusty

not-affected

3.13.0-35.62
esm-infra/xenial

not-affected

4.2.0-16.19
lucid

released

2.6.32-65.131
precise

released

3.2.0-68.102
precise/esm

not-affected

3.2.0-68.102
saucy

ignored

end of life
trusty

released

3.13.0-35.62
trusty/esm

not-affected

3.13.0-35.62
upstream

released

3.16~rc3

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

not-affected

x86 specific
precise/esm

DNE

precise was not-affected [x86 specific]
saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc3
utopic

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

not-affected

4.4.0-1002.2
esm-infra/xenial

not-affected

4.4.0-1001.10
precise

DNE

precise/esm

DNE

trusty

not-affected

4.4.0-1002.2
trusty/esm

not-affected

4.4.0-1002.2
upstream

released

3.16~rc3
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

released

2.6.32-369.85
precise

DNE

precise/esm

DNE

saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc3
utopic

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-apps/xenial

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [x86 specific]]
lucid

DNE

precise

DNE

precise/esm

DNE

saucy

DNE

trusty

not-affected

x86 specific
trusty/esm

DNE

trusty was not-affected [x86 specific]
upstream

not-affected

x86 specific

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

DNE

precise/esm

DNE

saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc3
utopic

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc3
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

xenial

not-affected

4.4.0-1003.3

Показывать по

РелизСтатусПримечание
devel

DNE

esm-apps/xenial

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was ignored [end of life, was needed]
lucid

DNE

precise

DNE

precise/esm

DNE

saucy

ignored

trusty

ignored

end of standard support, was needed
trusty/esm

ignored

end of life, was needed
upstream

released

3.16~rc3

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [x86 specific]]
lucid

DNE

precise

DNE

precise/esm

DNE

saucy

ignored

trusty

not-affected

x86 specific
trusty/esm

DNE

trusty was not-affected [x86 specific]
upstream

not-affected

x86 specific
utopic

not-affected

x86 specific

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/xenial

not-affected

4.8.0-36.36~16.04.1
precise

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc3
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/xenial

not-affected

4.8.0-36.36~16.04.1
precise

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc3
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

ignored

end of life
precise/esm

DNE

precise was ignored [abandoned]
saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc3
utopic

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

ignored

end of life
precise/esm

DNE

precise was ignored [abandoned]
saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc3
utopic

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

ignored

end of life
precise/esm

DNE

precise was ignored [abandoned]
saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc3
utopic

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

ignored

end of life, was pending
precise/esm

DNE

precise was ignored [was pending [3.5.0-55.82~precise1] OEM release]
saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc3
utopic

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

ignored

end of life, was needed
precise/esm

ignored

end of life, was needed
saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc3
utopic

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

ignored

end of life, was pending
precise/esm

DNE

precise was ignored [was pending [3.11.0-28.48~precise1] OEM release]
saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc3
utopic

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

released

3.13.0-35.62~precise1
precise/esm

not-affected

3.13.0-35.62~precise1
saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc3
utopic

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.16.0-25.33~14.04.2]]
lucid

DNE

precise

DNE

precise/esm

DNE

trusty

not-affected

3.16.0-25.33~14.04.2
trusty/esm

DNE

trusty was not-affected [3.16.0-25.33~14.04.2]
upstream

released

3.16~rc3
utopic

DNE

vivid

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.19.0-18.18~14.04.1]]
lucid

DNE

precise

DNE

precise/esm

DNE

trusty

not-affected

3.19.0-18.18~14.04.1
trusty/esm

DNE

trusty was not-affected [3.19.0-18.18~14.04.1]
upstream

released

3.16~rc3
utopic

DNE

vivid

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [4.2.0-18.22~14.04.1]]
precise

DNE

precise/esm

DNE

trusty

not-affected

4.2.0-18.22~14.04.1
trusty/esm

DNE

trusty was not-affected [4.2.0-18.22~14.04.1]
upstream

released

3.16~rc3
vivid

DNE

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

not-affected

4.4.0-13.29~14.04.1
precise

DNE

precise/esm

DNE

trusty

not-affected

4.4.0-13.29~14.04.1
trusty/esm

not-affected

4.4.0-13.29~14.04.1
upstream

released

3.16~rc3
vivid

DNE

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [x86 specific]]
lucid

DNE

precise

DNE

precise/esm

DNE

saucy

ignored

trusty

not-affected

x86 specific
trusty/esm

DNE

trusty was not-affected [x86 specific]
upstream

not-affected

x86 specific
utopic

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-apps/xenial

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [x86 specific]]
lucid

DNE

precise

DNE

precise/esm

DNE

saucy

ignored

trusty

not-affected

x86 specific
trusty/esm

DNE

trusty was not-affected [x86 specific]
upstream

not-affected

x86 specific

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [x86 specific]]
lucid

DNE

precise

DNE

precise/esm

DNE

saucy

ignored

trusty

not-affected

x86 specific
trusty/esm

DNE

trusty was not-affected [x86 specific]
upstream

not-affected

x86 specific
utopic

not-affected

x86 specific

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

DNE

precise/esm

DNE

saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc3
utopic

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

ignored

end of life
precise/esm

DNE

precise was ignored [abandoned]
saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc3
utopic

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

4.10.0-1004.6
esm-infra-legacy/trusty

DNE

precise

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc3
vivid

DNE

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

released

4.2.0-1014.21

Показывать по

РелизСтатусПримечание
devel

not-affected

4.4.0-1050.54
esm-infra-legacy/trusty

DNE

precise

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc3
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

not-affected

x86 specific
precise/esm

DNE

precise was not-affected [x86 specific]
saucy

not-affected

x86 specific
trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc3
utopic

DNE

Показывать по

EPSS

Процентиль: 12%
0.00043
Низкий

4.7 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.5
redhat
около 11 лет назад

arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000.

nvd
почти 11 лет назад

arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000.

debian
почти 11 лет назад

arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bi ...

github
около 3 лет назад

arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000.

oracle-oval
больше 4 лет назад

ELSA-2020-5934: kernel security update (IMPORTANT)

EPSS

Процентиль: 12%
0.00043
Низкий

4.7 Medium

CVSS2

Уязвимость CVE-2014-4508