First published: Tue May 06 2014(Updated: )
A flaw was discovered in the Linux kernel's pseudo tty (pty) device. An unprivileged user could exploit this flaw to cause a denial of service (system crash) or potentially gain administrator privileges.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.13.0-24-generic | <3.13.0-24.47 | 3.13.0-24.47 |
Ubuntu 22.04 LTS | =14.04 | |
All of | ||
ubuntu/linux-image-3.13.0-24-generic-lpae | <3.13.0-24.47 | 3.13.0-24.47 |
Ubuntu 22.04 LTS | =14.04 | |
All of | ||
ubuntu/linux-image-3.13.0-24-lowlatency | <3.13.0-24.47 | 3.13.0-24.47 |
Ubuntu 22.04 LTS | =14.04 | |
All of | ||
ubuntu/linux-image-3.13.0-24-powerpc-e500 | <3.13.0-24.47 | 3.13.0-24.47 |
Ubuntu 22.04 LTS | =14.04 | |
All of | ||
ubuntu/linux-image-3.13.0-24-powerpc-e500mc | <3.13.0-24.47 | 3.13.0-24.47 |
Ubuntu 22.04 LTS | =14.04 | |
All of | ||
ubuntu/linux-image-3.13.0-24-powerpc-smp | <3.13.0-24.47 | 3.13.0-24.47 |
Ubuntu 22.04 LTS | =14.04 | |
All of | ||
ubuntu/linux-image-3.13.0-24-powerpc64-emb | <3.13.0-24.47 | 3.13.0-24.47 |
Ubuntu 22.04 LTS | =14.04 | |
All of | ||
ubuntu/linux-image-3.13.0-24-powerpc64-smp | <3.13.0-24.47 | 3.13.0-24.47 |
Ubuntu 22.04 LTS | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-2204-1 is classified as a high severity vulnerability due to the potential for system crashes and escalated privileges.
The vulnerability can be mitigated by updating the Linux kernel to version 3.13.0-24.47 or later on affected Ubuntu systems.
USN-2204-1 affects Ubuntu 14.04 systems running specific kernel packages prior to version 3.13.0-24.47.
Exploiting USN-2204-1 can lead to a denial of service or unauthorized elevation of privileges for an unprivileged user.
At the time of the advisory, there is no public exploit known for USN-2204-1, but it remains a critical risk.