ALT-BU-2014-2695-1
Branch t7 update bulletin.
Closed bugs
При запуске приложения "Упражнение на сложение" вылетает ошибка
Версия 14.03
Package kernel-image-std-def updated to version 3.12.15-alt1 for branch t7 in task 117801.
Closed vulnerabilities
BDU:2014-00087
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать локальный отказ в обслуживании
BDU:2014-00088
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать локальный отказ в обслуживании
BDU:2014-00089
Уязвимость операционной системы Linux, приводящая к раскрытию информации
BDU:2014-00091
Уязвимость операционной системы Linux, позволяющая злоумышленнику получить доступ к конфиденциальной информации из памяти ядра
BDU:2014-00092
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании
BDU:2014-00093
Уязвимость операционной системы Linux, позволяющая злоумышленнику повысить свои привилегии
BDU:2014-00094
Уязвимость операционной системы Linux, позволяющая злоумышленнику повысить свои привилегии
BDU:2014-00095
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании
BDU:2014-00096
Уязвимость операционной системы Linux, позволяющая злоумышленнику повысить свои привилегии
BDU:2014-00097
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии
BDU:2014-00098
Уязвимость операционной системы Linux, позволяющая злоумышленнику повысить свои привилегии
BDU:2014-00099
Уязвимость операционной системы Linux, позволяющая злоумышленнику повысить свои привилегии
BDU:2014-00100
Уязвимость операционной системы Linux, позволяющая злоумышленнику получить доступ к конфиденциальной информации из памяти ядра
BDU:2014-00101
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании
BDU:2015-04307
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
BDU:2015-04308
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
BDU:2015-04309
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
BDU:2015-04310
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
BDU:2016-02003
Уязвимость операционной системы Android, позволяющая нарушителю получить конфиденциальную информацию
BDU:2016-02026
Уязвимость операционной системы Android, позволяющая нарушителю повысить свои привилегии
BDU:2019-02779
Уязвимость функции memcpy_fromiovecend () ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01410
Уязвимость буфера сокета SCTP ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-01630
Уязвимость модуля nf_tables подсистемы netfilter ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-11-21
CVE-2013-2888
Multiple array index errors in drivers/hid/hid-core.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11 allow physically proximate attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted device that provides an invalid Report ID.
- [linux-input] 20130828 [PATCH 01/14] HID: validate HID report id size
- [linux-input] 20130828 [PATCH 01/14] HID: validate HID report id size
- [oss-security] 20130828 Linux HID security flaws
- [oss-security] 20130828 Linux HID security flaws
- RHSA-2013:1490
- RHSA-2013:1490
- RHSA-2013:1645
- RHSA-2013:1645
- DSA-2766
- DSA-2766
- USN-1976-1
- USN-1976-1
- USN-1977-1
- USN-1977-1
- USN-1995-1
- USN-1995-1
- USN-1998-1
- USN-1998-1
- USN-2019-1
- USN-2019-1
- USN-2021-1
- USN-2021-1
- USN-2022-1
- USN-2022-1
- USN-2024-1
- USN-2024-1
- USN-2038-1
- USN-2038-1
- USN-2039-1
- USN-2039-1
- USN-2050-1
- USN-2050-1
Modified: 2024-11-21
CVE-2013-2889
drivers/hid/hid-zpff.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_ZEROPLUS is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
- [linux-input] 20130828 [PATCH 03/14] HID: zeroplus: validate output report details
- [linux-input] 20130828 [PATCH 03/14] HID: zeroplus: validate output report details
- [oss-security] 20130828 Linux HID security flaws
- [oss-security] 20130828 Linux HID security flaws
- RHSA-2013:1645
- RHSA-2013:1645
- 62042
- 62042
- USN-2015-1
- USN-2015-1
- USN-2016-1
- USN-2016-1
- USN-2019-1
- USN-2019-1
- USN-2020-1
- USN-2020-1
- USN-2021-1
- USN-2021-1
- USN-2022-1
- USN-2022-1
- USN-2023-1
- USN-2023-1
- USN-2024-1
- USN-2024-1
- USN-2038-1
- USN-2038-1
- USN-2039-1
- USN-2039-1
- USN-2050-1
- USN-2050-1
Modified: 2024-11-21
CVE-2013-2890
drivers/hid/hid-sony.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_SONY is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
Modified: 2024-11-21
CVE-2013-2891
drivers/hid/hid-steelseries.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_STEELSERIES is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
Modified: 2024-11-21
CVE-2013-2892
drivers/hid/hid-pl.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_PANTHERLORD is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
- [linux-input] 20130828 [PATCH 06/14] HID: pantherlord: validate output report details
- [linux-input] 20130828 [PATCH 06/14] HID: pantherlord: validate output report details
- [oss-security] 20130828 Linux HID security flaws
- [oss-security] 20130828 Linux HID security flaws
- RHSA-2013:1490
- RHSA-2013:1490
- RHSA-2013:1645
- RHSA-2013:1645
- DSA-2766
- DSA-2766
- 62049
- 62049
- USN-1976-1
- USN-1976-1
- USN-1977-1
- USN-1977-1
- USN-1995-1
- USN-1995-1
- USN-1998-1
- USN-1998-1
- USN-2019-1
- USN-2019-1
- USN-2021-1
- USN-2021-1
- USN-2022-1
- USN-2022-1
- USN-2024-1
- USN-2024-1
- USN-2038-1
- USN-2038-1
- USN-2039-1
- USN-2039-1
- USN-2050-1
- USN-2050-1
Modified: 2024-11-21
CVE-2013-2893
The Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_LOGITECH_FF, CONFIG_LOGIG940_FF, or CONFIG_LOGIWHEELS_FF is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device, related to (1) drivers/hid/hid-lgff.c, (2) drivers/hid/hid-lg3ff.c, and (3) drivers/hid/hid-lg4ff.c.
- SUSE-SU-2015:0481
- SUSE-SU-2015:0481
- openSUSE-SU-2015:0566
- openSUSE-SU-2015:0566
- [linux-input] 20130828 [PATCH 07/14] HID: LG: validate HID output report details
- [linux-input] 20130828 [PATCH 07/14] HID: LG: validate HID output report details
- [oss-security] 20130828 Linux HID security flaws
- [oss-security] 20130828 Linux HID security flaws
- RHSA-2013:1490
- RHSA-2013:1490
- 62050
- 62050
- USN-2015-1
- USN-2015-1
- USN-2016-1
- USN-2016-1
- USN-2019-1
- USN-2019-1
- USN-2020-1
- USN-2020-1
- USN-2021-1
- USN-2021-1
- USN-2022-1
- USN-2022-1
- USN-2023-1
- USN-2023-1
- USN-2024-1
- USN-2024-1
- USN-2038-1
- USN-2038-1
- USN-2039-1
- USN-2039-1
- USN-2050-1
- USN-2050-1
Modified: 2024-11-21
CVE-2013-2894
drivers/hid/hid-lenovo-tpkbd.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_LENOVO_TPKBD is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
- [linux-input] 20130828 [PATCH 08/14] HID: lenovo-tpkbd: validate output report details
- [linux-input] 20130828 [PATCH 08/14] HID: lenovo-tpkbd: validate output report details
- [oss-security] 20130828 Linux HID security flaws
- [oss-security] 20130828 Linux HID security flaws
- USN-2020-1
- USN-2020-1
- USN-2023-1
- USN-2023-1
Modified: 2024-11-21
CVE-2013-2895
drivers/hid/hid-logitech-dj.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_LOGITECH_DJ is enabled, allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) or obtain sensitive information from kernel memory via a crafted device.
- [linux-input] 20130828 [PATCH 09/14] HID: logitech-dj: validate output report details
- [linux-input] 20130828 [PATCH 09/14] HID: logitech-dj: validate output report details
- [oss-security] 20130828 Linux HID security flaws
- [oss-security] 20130828 Linux HID security flaws
- RHSA-2013:1490
- RHSA-2013:1490
- USN-2019-1
- USN-2019-1
- USN-2020-1
- USN-2020-1
- USN-2021-1
- USN-2021-1
- USN-2022-1
- USN-2022-1
- USN-2023-1
- USN-2023-1
- USN-2024-1
- USN-2024-1
- USN-2038-1
- USN-2038-1
- USN-2039-1
- USN-2039-1
- USN-2050-1
- USN-2050-1
Modified: 2024-11-21
CVE-2013-2896
drivers/hid/hid-ntrig.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_NTRIG is enabled, allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) via a crafted device.
- [linux-input] 20130828 [PATCH 10/14] HID: ntrig: validate feature report details
- [linux-input] 20130828 [PATCH 10/14] HID: ntrig: validate feature report details
- [oss-security] 20130828 Linux HID security flaws
- [oss-security] 20130828 Linux HID security flaws
- RHSA-2013:1490
- RHSA-2013:1490
- USN-1995-1
- USN-1995-1
- USN-1998-1
- USN-1998-1
- USN-2019-1
- USN-2019-1
- USN-2021-1
- USN-2021-1
- USN-2022-1
- USN-2022-1
- USN-2024-1
- USN-2024-1
- USN-2038-1
- USN-2038-1
- USN-2039-1
- USN-2039-1
- USN-2050-1
- USN-2050-1
Modified: 2024-11-21
CVE-2013-2897
Multiple array index errors in drivers/hid/hid-multitouch.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_MULTITOUCH is enabled, allow physically proximate attackers to cause a denial of service (heap memory corruption, or NULL pointer dereference and OOPS) via a crafted device.
- SUSE-SU-2015:0481
- SUSE-SU-2015:0481
- openSUSE-SU-2015:0566
- openSUSE-SU-2015:0566
- [linux-input] 20130828 [PATCH 11/14] HID: multitouch: validate feature report details
- [linux-input] 20130828 [PATCH 11/14] HID: multitouch: validate feature report details
- [oss-security] 20130828 Linux HID security flaws
- [oss-security] 20130828 Linux HID security flaws
- 62044
- 62044
- USN-2015-1
- USN-2015-1
- USN-2016-1
- USN-2016-1
- USN-2019-1
- USN-2019-1
- USN-2020-1
- USN-2020-1
- USN-2021-1
- USN-2021-1
- USN-2022-1
- USN-2022-1
- USN-2023-1
- USN-2023-1
- USN-2024-1
- USN-2024-1
- USN-2038-1
- USN-2038-1
- USN-2039-1
- USN-2039-1
- USN-2050-1
- USN-2050-1
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.54
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.54
Modified: 2024-11-21
CVE-2013-2898
drivers/hid/hid-sensor-hub.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_SENSOR_HUB is enabled, allows physically proximate attackers to obtain sensitive information from kernel memory via a crafted device.
- [linux-input] 20130828 [PATCH 12/14] HID: sensor-hub: validate feature report details
- [linux-input] 20130828 [PATCH 12/14] HID: sensor-hub: validate feature report details
- [oss-security] 20130828 Linux HID security flaws
- [oss-security] 20130828 Linux HID security flaws
- USN-1995-1
- USN-1995-1
- USN-1998-1
- USN-1998-1
Modified: 2024-11-21
CVE-2013-2899
drivers/hid/hid-picolcd_core.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_PICOLCD is enabled, allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) via a crafted device.
- SUSE-SU-2015:0481
- SUSE-SU-2015:0481
- openSUSE-SU-2015:0566
- openSUSE-SU-2015:0566
- [linux-input] 20130828 [PATCH 13/14] HID: picolcd_core: validate output report details
- [linux-input] 20130828 [PATCH 13/14] HID: picolcd_core: validate output report details
- [oss-security] 20130828 Linux HID security flaws
- [oss-security] 20130828 Linux HID security flaws
- USN-1995-1
- USN-1995-1
- USN-1998-1
- USN-1998-1
- USN-2019-1
- USN-2019-1
- USN-2021-1
- USN-2021-1
- USN-2022-1
- USN-2022-1
- USN-2024-1
- USN-2024-1
- USN-2038-1
- USN-2038-1
- USN-2039-1
- USN-2039-1
- USN-2050-1
- USN-2050-1
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.73
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.73
Modified: 2024-11-21
CVE-2013-2929
The Linux kernel before 3.12.2 does not properly use the get_dumpable function, which allows local users to bypass intended ptrace restrictions or obtain sensitive information from IA64 scratch registers via a crafted application, related to kernel/ptrace.c and arch/ia64/include/asm/processor.h.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d049f74f2dbe71354d43d393ac3a188947811348
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d049f74f2dbe71354d43d393ac3a188947811348
- SUSE-SU-2015:0481
- SUSE-SU-2015:0481
- openSUSE-SU-2015:0566
- openSUSE-SU-2015:0566
- RHSA-2014:0100
- RHSA-2014:0100
- RHSA-2014:0159
- RHSA-2014:0159
- RHSA-2014:0285
- RHSA-2014:0285
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.2
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.2
- 64111
- 64111
- USN-2070-1
- USN-2070-1
- USN-2075-1
- USN-2075-1
- USN-2109-1
- USN-2109-1
- USN-2110-1
- USN-2110-1
- USN-2111-1
- USN-2111-1
- USN-2112-1
- USN-2112-1
- USN-2114-1
- USN-2114-1
- USN-2115-1
- USN-2115-1
- USN-2116-1
- USN-2116-1
- USN-2128-1
- USN-2128-1
- USN-2129-1
- USN-2129-1
- RHSA-2018:1252
- RHSA-2018:1252
- https://bugzilla.redhat.com/show_bug.cgi?id=1028148
- https://bugzilla.redhat.com/show_bug.cgi?id=1028148
- https://github.com/torvalds/linux/commit/d049f74f2dbe71354d43d393ac3a188947811348
- https://github.com/torvalds/linux/commit/d049f74f2dbe71354d43d393ac3a188947811348
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.54
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.54
Modified: 2024-11-21
CVE-2013-2930
The perf_trace_event_perm function in kernel/trace/trace_event_perf.c in the Linux kernel before 3.12.2 does not properly restrict access to the perf subsystem, which allows local users to enable function tracing via a crafted application.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=12ae030d54ef250706da5642fc7697cc60ad0df7
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=12ae030d54ef250706da5642fc7697cc60ad0df7
- RHSA-2014:0100
- RHSA-2014:0100
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.2
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.2
- USN-2068-1
- USN-2068-1
- USN-2070-1
- USN-2070-1
- USN-2071-1
- USN-2071-1
- USN-2072-1
- USN-2072-1
- USN-2074-1
- USN-2074-1
- USN-2075-1
- USN-2075-1
- USN-2076-1
- USN-2076-1
- USN-2112-1
- USN-2112-1
- https://github.com/torvalds/linux/commit/12ae030d54ef250706da5642fc7697cc60ad0df7
- https://github.com/torvalds/linux/commit/12ae030d54ef250706da5642fc7697cc60ad0df7
Modified: 2024-11-21
CVE-2013-4270
The net_ctl_permissions function in net/sysctl_net.c in the Linux kernel before 3.11.5 does not properly determine uid and gid values, which allows local users to bypass intended /proc/sys/net restrictions via a crafted application.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2433c8f094a008895e66f25bd1773cdb01c91d01
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2433c8f094a008895e66f25bd1773cdb01c91d01
- RHSA-2014:0100
- RHSA-2014:0100
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.5
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.5
- USN-2049-1
- USN-2049-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1027752
- https://bugzilla.redhat.com/show_bug.cgi?id=1027752
- https://github.com/torvalds/linux/commit/2433c8f094a008895e66f25bd1773cdb01c91d01
- https://github.com/torvalds/linux/commit/2433c8f094a008895e66f25bd1773cdb01c91d01
Modified: 2024-11-21
CVE-2013-4299
Interpretation conflict in drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6 allows remote authenticated users to obtain sensitive information or modify data via a crafted mapping to a snapshot block device.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9c6a182649f4259db704ae15a91ac820e63b0ca
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9c6a182649f4259db704ae15a91ac820e63b0ca
- SUSE-SU-2015:0652
- SUSE-SU-2015:0652
- SUSE-SU-2015:0812
- SUSE-SU-2015:0812
- RHSA-2013:1436
- RHSA-2013:1436
- RHSA-2013:1449
- RHSA-2013:1449
- RHSA-2013:1450
- RHSA-2013:1450
- RHSA-2013:1460
- RHSA-2013:1460
- RHSA-2013:1490
- RHSA-2013:1490
- RHSA-2013:1519
- RHSA-2013:1519
- RHSA-2013:1520
- RHSA-2013:1520
- RHSA-2013:1783
- RHSA-2013:1783
- RHSA-2013:1860
- RHSA-2013:1860
- USN-2015-1
- USN-2015-1
- USN-2016-1
- USN-2016-1
- USN-2040-1
- USN-2040-1
- USN-2041-1
- USN-2041-1
- USN-2042-1
- USN-2042-1
- USN-2043-1
- USN-2043-1
- USN-2044-1
- USN-2044-1
- USN-2045-1
- USN-2045-1
- USN-2046-1
- USN-2046-1
- USN-2049-1
- USN-2049-1
- USN-2050-1
- USN-2050-1
- USN-2066-1
- USN-2066-1
- USN-2067-1
- USN-2067-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1004233
- https://bugzilla.redhat.com/show_bug.cgi?id=1004233
- https://github.com/torvalds/linux/commit/e9c6a182649f4259db704ae15a91ac820e63b0ca
- https://github.com/torvalds/linux/commit/e9c6a182649f4259db704ae15a91ac820e63b0ca
Modified: 2024-11-21
CVE-2013-4343
Use-after-free vulnerability in drivers/net/tun.c in the Linux kernel through 3.11.1 allows local users to gain privileges by leveraging the CAP_NET_ADMIN capability and providing an invalid tuntap interface name in a TUNSETIFF ioctl call.
- openSUSE-SU-2019:1479
- openSUSE-SU-2019:1479
- openSUSE-SU-2019:1570
- openSUSE-SU-2019:1570
- openSUSE-SU-2019:1579
- openSUSE-SU-2019:1579
- [linux-kernel] 20130911 [PATCH net V2] tuntap: correctly handle error in tun_set_iff()
- [linux-kernel] 20130911 [PATCH net V2] tuntap: correctly handle error in tun_set_iff()
- RHSA-2013:1490
- RHSA-2013:1490
- [oss-security] 20130912 Fwd: Use-after-free in TUNSETIFF
- [oss-security] 20130912 Fwd: Use-after-free in TUNSETIFF
- [netdev] 20130911 Use-after-free in TUNSETIFF
- [netdev] 20130911 Use-after-free in TUNSETIFF
- USN-2020-1
- USN-2020-1
- USN-2023-1
- USN-2023-1
- USN-2049-1
- USN-2049-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1007733
- https://bugzilla.redhat.com/show_bug.cgi?id=1007733
Modified: 2024-11-21
CVE-2013-4345
Off-by-one error in the get_prng_bytes function in crypto/ansi_cprng.c in the Linux kernel through 3.11.4 makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via multiple requests for small amounts of data, leading to improper management of the state of the consumed data.
- [linux-crypto] 20130917 [PATCH] ansi_cprng: Fix off by one error in non-block size request
- [linux-crypto] 20130917 [PATCH] ansi_cprng: Fix off by one error in non-block size request
- RHSA-2013:1449
- RHSA-2013:1449
- RHSA-2013:1490
- RHSA-2013:1490
- RHSA-2013:1645
- RHSA-2013:1645
- 62740
- 62740
- USN-2064-1
- USN-2064-1
- USN-2065-1
- USN-2065-1
- USN-2068-1
- USN-2068-1
- USN-2070-1
- USN-2070-1
- USN-2071-1
- USN-2071-1
- USN-2072-1
- USN-2072-1
- USN-2074-1
- USN-2074-1
- USN-2075-1
- USN-2075-1
- USN-2076-1
- USN-2076-1
- USN-2109-1
- USN-2109-1
- USN-2110-1
- USN-2110-1
- USN-2158-1
- USN-2158-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1007690
- https://bugzilla.redhat.com/show_bug.cgi?id=1007690
Modified: 2024-11-21
CVE-2013-4350
The IPv6 SCTP implementation in net/sctp/ipv6.c in the Linux kernel through 3.11.1 uses data structures and function calls that do not trigger an intended configuration of IPsec encryption, which allows remote attackers to obtain sensitive information by sniffing the network.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=95ee62083cb6453e056562d91f597552021e6ae7
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=95ee62083cb6453e056562d91f597552021e6ae7
- RHSA-2013:1490
- RHSA-2013:1490
- [oss-security] 20130913 Re: CVE request -- Linux kernel: net: sctp: ipv6 ipsec encryption bug in sctp_v6_xmit
- [oss-security] 20130913 Re: CVE request -- Linux kernel: net: sctp: ipv6 ipsec encryption bug in sctp_v6_xmit
- USN-2019-1
- USN-2019-1
- USN-2021-1
- USN-2021-1
- USN-2022-1
- USN-2022-1
- USN-2024-1
- USN-2024-1
- USN-2038-1
- USN-2038-1
- USN-2039-1
- USN-2039-1
- USN-2041-1
- USN-2041-1
- USN-2045-1
- USN-2045-1
- USN-2049-1
- USN-2049-1
- USN-2050-1
- USN-2050-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1007872
- https://bugzilla.redhat.com/show_bug.cgi?id=1007872
- https://github.com/torvalds/linux/commit/95ee62083cb6453e056562d91f597552021e6ae7
- https://github.com/torvalds/linux/commit/95ee62083cb6453e056562d91f597552021e6ae7
Modified: 2024-11-21
CVE-2013-4387
net/ipv6/ip6_output.c in the Linux kernel through 3.11.4 does not properly determine the need for UDP Fragmentation Offload (UFO) processing of small packets after the UFO queueing of a large packet, which allows remote attackers to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via network traffic that triggers a large response packet.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2811ebac2521ceac84f2bdae402455baa6a7fb47
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2811ebac2521ceac84f2bdae402455baa6a7fb47
- RHSA-2013:1490
- RHSA-2013:1490
- RHSA-2013:1645
- RHSA-2013:1645
- RHSA-2014:0284
- RHSA-2014:0284
- [oss-security] 20130928 Re: linux kernel memory corruption with ipv6 udp offloading
- [oss-security] 20130928 Re: linux kernel memory corruption with ipv6 udp offloading
- USN-2019-1
- USN-2019-1
- USN-2021-1
- USN-2021-1
- USN-2022-1
- USN-2022-1
- USN-2024-1
- USN-2024-1
- USN-2038-1
- USN-2038-1
- USN-2039-1
- USN-2039-1
- USN-2041-1
- USN-2041-1
- USN-2045-1
- USN-2045-1
- USN-2049-1
- USN-2049-1
- USN-2050-1
- USN-2050-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1011927
- https://bugzilla.redhat.com/show_bug.cgi?id=1011927
- https://github.com/torvalds/linux/commit/2811ebac2521ceac84f2bdae402455baa6a7fb47
- https://github.com/torvalds/linux/commit/2811ebac2521ceac84f2bdae402455baa6a7fb47
Modified: 2024-11-21
CVE-2013-4470
The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsockopt system call and sends both short and long packets, related to the ip_ufo_append_data function in net/ipv4/ip_output.c and the ip6_ufo_append_data function in net/ipv6/ip6_output.c.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c547dbf55d5f8cf615ccc0e7265e98db27d3fb8b
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c547dbf55d5f8cf615ccc0e7265e98db27d3fb8b
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e93b7d748be887cd7639b113ba7d7ef792a7efb9
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e93b7d748be887cd7639b113ba7d7ef792a7efb9
- SUSE-SU-2014:0459
- SUSE-SU-2014:0459
- RHSA-2013:1801
- RHSA-2013:1801
- RHSA-2014:0100
- RHSA-2014:0100
- RHSA-2014:0284
- RHSA-2014:0284
- [oss-security] 20131025 Re: CVE request: Linux kernel: net: memory corruption with UDP_CORK and UFO
- [oss-security] 20131025 Re: CVE request: Linux kernel: net: memory corruption with UDP_CORK and UFO
- 63359
- 63359
- USN-2040-1
- USN-2040-1
- USN-2042-1
- USN-2042-1
- USN-2043-1
- USN-2043-1
- USN-2044-1
- USN-2044-1
- USN-2046-1
- USN-2046-1
- USN-2049-1
- USN-2049-1
- USN-2050-1
- USN-2050-1
- USN-2066-1
- USN-2066-1
- USN-2067-1
- USN-2067-1
- USN-2069-1
- USN-2069-1
- USN-2073-1
- USN-2073-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1023477
- https://bugzilla.redhat.com/show_bug.cgi?id=1023477
- https://github.com/torvalds/linux/commit/c547dbf55d5f8cf615ccc0e7265e98db27d3fb8b
- https://github.com/torvalds/linux/commit/c547dbf55d5f8cf615ccc0e7265e98db27d3fb8b
- https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9
- https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9
- https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.12.bz2
- https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.12.bz2
Modified: 2024-11-21
CVE-2013-4511
Multiple integer overflows in Alchemy LCD frame-buffer drivers in the Linux kernel before 3.12 allow local users to create a read-write memory mapping for the entirety of kernel memory, and consequently gain privileges, via crafted mmap operations, related to the (1) au1100fb_fb_mmap function in drivers/video/au1100fb.c and the (2) au1200fb_fb_mmap function in drivers/video/au1200fb.c.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7314e613d5ff9f0934f7a0f74ed7973b903315d1
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7314e613d5ff9f0934f7a0f74ed7973b903315d1
- openSUSE-SU-2014:0204
- openSUSE-SU-2014:0204
- openSUSE-SU-2014:0205
- openSUSE-SU-2014:0205
- openSUSE-SU-2014:0247
- openSUSE-SU-2014:0247
- [oss-security] 20131104 Re: some unstracked linux kernel security fixes
- [oss-security] 20131104 Re: some unstracked linux kernel security fixes
- USN-2036-1
- USN-2036-1
- USN-2037-1
- USN-2037-1
- USN-2066-1
- USN-2066-1
- USN-2067-1
- USN-2067-1
- USN-2068-1
- USN-2068-1
- USN-2069-1
- USN-2069-1
- USN-2070-1
- USN-2070-1
- USN-2071-1
- USN-2071-1
- USN-2072-1
- USN-2072-1
- USN-2073-1
- USN-2073-1
- USN-2074-1
- USN-2074-1
- USN-2075-1
- USN-2075-1
- USN-2076-1
- USN-2076-1
- https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
- https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
- https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.12.bz2
- https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.12.bz2
Modified: 2024-11-21
CVE-2013-4512
Buffer overflow in the exitcode_proc_write function in arch/um/kernel/exitcode.c in the Linux kernel before 3.12 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging root privileges for a write operation.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=201f99f170df14ba52ea4c52847779042b7a623b
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=201f99f170df14ba52ea4c52847779042b7a623b
- [oss-security] 20131104 Re: some unstracked linux kernel security fixes
- [oss-security] 20131104 Re: some unstracked linux kernel security fixes
- 63510
- 63510
- https://github.com/torvalds/linux/commit/201f99f170df14ba52ea4c52847779042b7a623b
- https://github.com/torvalds/linux/commit/201f99f170df14ba52ea4c52847779042b7a623b
- https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.12.bz2
- https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.12.bz2
Modified: 2024-11-21
CVE-2013-4513
Buffer overflow in the oz_cdev_write function in drivers/staging/ozwpan/ozcdev.c in the Linux kernel before 3.12 allows local users to cause a denial of service or possibly have unspecified other impact via a crafted write operation.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c2c65cd2e14ada6de44cb527e7f1990bede24e15
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c2c65cd2e14ada6de44cb527e7f1990bede24e15
- openSUSE-SU-2014:0204
- openSUSE-SU-2014:0204
- [oss-security] 20131104 Re: some unstracked linux kernel security fixes
- [oss-security] 20131104 Re: some unstracked linux kernel security fixes
- 63508
- 63508
- USN-2068-1
- USN-2068-1
- USN-2069-1
- USN-2069-1
- USN-2070-1
- USN-2070-1
- USN-2071-1
- USN-2071-1
- USN-2072-1
- USN-2072-1
- USN-2073-1
- USN-2073-1
- USN-2074-1
- USN-2074-1
- USN-2075-1
- USN-2075-1
- USN-2076-1
- USN-2076-1
- https://github.com/torvalds/linux/commit/c2c65cd2e14ada6de44cb527e7f1990bede24e15
- https://github.com/torvalds/linux/commit/c2c65cd2e14ada6de44cb527e7f1990bede24e15
- https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.12.bz2
- https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.12.bz2
Modified: 2024-11-21
CVE-2013-4514
Multiple buffer overflows in drivers/staging/wlags49_h2/wl_priv.c in the Linux kernel before 3.12 allow local users to cause a denial of service or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability and providing a long station-name string, related to the (1) wvlan_uil_put_info and (2) wvlan_set_station_nickname functions.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b5e2f339865fb443107e5b10603e53bbc92dc054
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b5e2f339865fb443107e5b10603e53bbc92dc054
- openSUSE-SU-2014:0204
- openSUSE-SU-2014:0204
- openSUSE-SU-2014:0247
- openSUSE-SU-2014:0247
- [oss-security] 20131104 Re: some unstracked linux kernel security fixes
- [oss-security] 20131104 Re: some unstracked linux kernel security fixes
- 63509
- 63509
- USN-2066-1
- USN-2066-1
- USN-2067-1
- USN-2067-1
- USN-2068-1
- USN-2068-1
- USN-2069-1
- USN-2069-1
- USN-2070-1
- USN-2070-1
- USN-2071-1
- USN-2071-1
- USN-2072-1
- USN-2072-1
- USN-2073-1
- USN-2073-1
- USN-2074-1
- USN-2074-1
- USN-2075-1
- USN-2075-1
- USN-2076-1
- USN-2076-1
- https://github.com/torvalds/linux/commit/b5e2f339865fb443107e5b10603e53bbc92dc054
- https://github.com/torvalds/linux/commit/b5e2f339865fb443107e5b10603e53bbc92dc054
- https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.12.bz2
- https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.12.bz2
Modified: 2024-11-21
CVE-2013-4515
The bcm_char_ioctl function in drivers/staging/bcm/Bcmchar.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via an IOCTL_BCM_GET_DEVICE_DRIVER_INFO ioctl call.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8d1e72250c847fa96498ec029891de4dc638a5ba
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8d1e72250c847fa96498ec029891de4dc638a5ba
- openSUSE-SU-2014:0204
- openSUSE-SU-2014:0204
- openSUSE-SU-2014:0247
- openSUSE-SU-2014:0247
- [oss-security] 20131104 Re: some unstracked linux kernel security fixes
- [oss-security] 20131104 Re: some unstracked linux kernel security fixes
- USN-2066-1
- USN-2066-1
- USN-2067-1
- USN-2067-1
- USN-2068-1
- USN-2068-1
- USN-2069-1
- USN-2069-1
- USN-2070-1
- USN-2070-1
- USN-2071-1
- USN-2071-1
- USN-2072-1
- USN-2072-1
- USN-2073-1
- USN-2073-1
- USN-2074-1
- USN-2074-1
- USN-2075-1
- USN-2075-1
- USN-2076-1
- USN-2076-1
- https://github.com/torvalds/linux/commit/8d1e72250c847fa96498ec029891de4dc638a5ba
- https://github.com/torvalds/linux/commit/8d1e72250c847fa96498ec029891de4dc638a5ba
- https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.12.bz2
- https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.12.bz2
Modified: 2024-11-21
CVE-2013-4516
The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
- [oss-security] 20131104 Re: some unstracked linux kernel security fixes
- [oss-security] 20131104 Re: some unstracked linux kernel security fixes
- USN-2069-1
- USN-2069-1
- USN-2070-1
- USN-2070-1
- USN-2073-1
- USN-2073-1
- USN-2075-1
- USN-2075-1
- https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
- https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
- https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.12.bz2
- https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.12.bz2
Modified: 2024-11-21
CVE-2013-4579
The ath9k_htc_set_bssid_mask function in drivers/net/wireless/ath/ath9k/htc_drv_main.c in the Linux kernel through 3.12 uses a BSSID masking approach to determine the set of MAC addresses on which a Wi-Fi device is listening, which allows remote attackers to discover the original MAC address after spoofing by sending a series of packets to MAC addresses with certain bit manipulations.
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729573
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729573
- http://www.mathyvanhoef.com/2013/11/unmasking-spoofed-mac-address.html
- http://www.mathyvanhoef.com/2013/11/unmasking-spoofed-mac-address.html
- [oss-security] 20131114 Re: CVE request: ath9k_htc improperly updates MAC address
- [oss-security] 20131114 Re: CVE request: ath9k_htc improperly updates MAC address
- USN-2113-1
- USN-2113-1
- USN-2117-1
- USN-2117-1
- USN-2133-1
- USN-2133-1
- USN-2134-1
- USN-2134-1
- USN-2135-1
- USN-2135-1
- USN-2136-1
- USN-2136-1
- USN-2138-1
- USN-2138-1
- USN-2139-1
- USN-2139-1
- USN-2141-1
- USN-2141-1
- [ath9k-devel] 20131110 Security Bug: MAC address not properly configured
- [ath9k-devel] 20131110 Security Bug: MAC address not properly configured
Modified: 2024-11-21
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=338c7dbadd2671189cec7faf64c84d01071b3f96
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=338c7dbadd2671189cec7faf64c84d01071b3f96
- openSUSE-SU-2014:0204
- openSUSE-SU-2014:0204
- openSUSE-SU-2014:0205
- openSUSE-SU-2014:0205
- openSUSE-SU-2014:0247
- openSUSE-SU-2014:0247
- [oss-security] 20131212 Re: [vs-plain] kvm issues
- [oss-security] 20131212 Re: [vs-plain] kvm issues
- USN-2109-1
- USN-2109-1
- USN-2110-1
- USN-2110-1
- USN-2113-1
- USN-2113-1
- USN-2117-1
- USN-2117-1
- USN-2128-1
- USN-2128-1
- USN-2129-1
- USN-2129-1
- USN-2135-1
- USN-2135-1
- USN-2136-1
- USN-2136-1
- USN-2138-1
- USN-2138-1
- USN-2139-1
- USN-2139-1
- USN-2141-1
- USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1030986
- https://bugzilla.redhat.com/show_bug.cgi?id=1030986
- https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
- https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.54
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.54
Modified: 2024-11-21
CVE-2013-6367
The apic_get_tmcct function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via crafted modifications of the TMICT value.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b963a22e6d1a266a67e9eecc88134713fd54775c
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b963a22e6d1a266a67e9eecc88134713fd54775c
- openSUSE-SU-2014:0204
- openSUSE-SU-2014:0204
- openSUSE-SU-2014:0205
- openSUSE-SU-2014:0205
- openSUSE-SU-2014:0247
- openSUSE-SU-2014:0247
- RHSA-2013:1801
- RHSA-2013:1801
- RHSA-2014:0163
- RHSA-2014:0163
- RHSA-2014:0284
- RHSA-2014:0284
- [oss-security] 20131212 Re: [vs-plain] kvm issues
- [oss-security] 20131212 Re: [vs-plain] kvm issues
- 64270
- 64270
- USN-2109-1
- USN-2109-1
- USN-2110-1
- USN-2110-1
- USN-2113-1
- USN-2113-1
- USN-2117-1
- USN-2117-1
- USN-2128-1
- USN-2128-1
- USN-2129-1
- USN-2129-1
- USN-2135-1
- USN-2135-1
- USN-2136-1
- USN-2136-1
- USN-2138-1
- USN-2138-1
- USN-2139-1
- USN-2139-1
- USN-2141-1
- USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1032207
- https://bugzilla.redhat.com/show_bug.cgi?id=1032207
- https://github.com/torvalds/linux/commit/b963a22e6d1a266a67e9eecc88134713fd54775c
- https://github.com/torvalds/linux/commit/b963a22e6d1a266a67e9eecc88134713fd54775c
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.54
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.54
Modified: 2024-11-21
CVE-2013-6368
The KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges or cause a denial of service (system crash) via a VAPIC synchronization operation involving a page-end address.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fda4e2e85589191b123d31cdc21fd33ee70f50fd
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fda4e2e85589191b123d31cdc21fd33ee70f50fd
- openSUSE-SU-2014:0204
- openSUSE-SU-2014:0204
- openSUSE-SU-2014:0205
- openSUSE-SU-2014:0205
- openSUSE-SU-2014:0247
- openSUSE-SU-2014:0247
- RHSA-2013:1801
- RHSA-2013:1801
- RHSA-2014:0163
- RHSA-2014:0163
- RHSA-2014:0284
- RHSA-2014:0284
- [oss-security] 20131212 Re: [vs-plain] kvm issues
- [oss-security] 20131212 Re: [vs-plain] kvm issues
- 64291
- 64291
- USN-2113-1
- USN-2113-1
- USN-2117-1
- USN-2117-1
- USN-2133-1
- USN-2133-1
- USN-2134-1
- USN-2134-1
- USN-2135-1
- USN-2135-1
- USN-2136-1
- USN-2136-1
- USN-2138-1
- USN-2138-1
- USN-2139-1
- USN-2139-1
- USN-2141-1
- USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1032210
- https://bugzilla.redhat.com/show_bug.cgi?id=1032210
- https://github.com/torvalds/linux/commit/fda4e2e85589191b123d31cdc21fd33ee70f50fd
- https://github.com/torvalds/linux/commit/fda4e2e85589191b123d31cdc21fd33ee70f50fd
Modified: 2024-11-21
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=17d68b763f09a9ce824ae23eb62c9efc57b69271
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=17d68b763f09a9ce824ae23eb62c9efc57b69271
- openSUSE-SU-2014:0204
- openSUSE-SU-2014:0204
- openSUSE-SU-2014:0205
- openSUSE-SU-2014:0205
- [oss-security] 20131212 Re: [vs-plain] kvm issues
- [oss-security] 20131212 Re: [vs-plain] kvm issues
- 64319
- 64319
- USN-2113-1
- USN-2113-1
- USN-2117-1
- USN-2117-1
- USN-2136-1
- USN-2136-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1033106
- https://bugzilla.redhat.com/show_bug.cgi?id=1033106
- https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
- https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
Modified: 2024-11-21
CVE-2013-6378
The lbs_debugfs_write function in drivers/net/wireless/libertas/debugfs.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service (OOPS) by leveraging root privileges for a zero-length write operation.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a497e47d4aec37aaf8f13509f3ef3d1f6a717d88
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a497e47d4aec37aaf8f13509f3ef3d1f6a717d88
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- http://linux.oracle.com/errata/ELSA-2014-3043.html
- http://linux.oracle.com/errata/ELSA-2014-3043.html
- openSUSE-SU-2014:0204
- openSUSE-SU-2014:0204
- openSUSE-SU-2014:0247
- openSUSE-SU-2014:0247
- RHSA-2014:0100
- RHSA-2014:0100
- 59262
- 59262
- 59309
- 59309
- 59406
- 59406
- [oss-security] 20131122 Linux kernel CVE fixes
- [oss-security] 20131122 Linux kernel CVE fixes
- 63886
- 63886
- USN-2064-1
- USN-2064-1
- USN-2065-1
- USN-2065-1
- USN-2066-1
- USN-2066-1
- USN-2067-1
- USN-2067-1
- USN-2070-1
- USN-2070-1
- USN-2075-1
- USN-2075-1
- USN-2111-1
- USN-2111-1
- USN-2112-1
- USN-2112-1
- USN-2114-1
- USN-2114-1
- USN-2115-1
- USN-2115-1
- USN-2116-1
- USN-2116-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1033578
- https://bugzilla.redhat.com/show_bug.cgi?id=1033578
- https://github.com/torvalds/linux/commit/a497e47d4aec37aaf8f13509f3ef3d1f6a717d88
- https://github.com/torvalds/linux/commit/a497e47d4aec37aaf8f13509f3ef3d1f6a717d88
Modified: 2024-11-21
CVE-2013-6380
The aac_send_raw_srb function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 3.12.1 does not properly validate a certain size value, which allows local users to cause a denial of service (invalid pointer dereference) or possibly have unspecified other impact via an FSACTL_SEND_RAW_SRB ioctl call that triggers a crafted SRB command.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b4789b8e6be3151a955ade74872822f30e8cd914
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b4789b8e6be3151a955ade74872822f30e8cd914
- openSUSE-SU-2014:0204
- openSUSE-SU-2014:0204
- openSUSE-SU-2014:0247
- openSUSE-SU-2014:0247
- [oss-security] 20131122 Linux kernel CVE fixes
- [oss-security] 20131122 Linux kernel CVE fixes
- USN-2070-1
- USN-2070-1
- USN-2075-1
- USN-2075-1
- USN-2109-1
- USN-2109-1
- USN-2110-1
- USN-2110-1
- USN-2111-1
- USN-2111-1
- USN-2114-1
- USN-2114-1
- USN-2115-1
- USN-2115-1
- USN-2116-1
- USN-2116-1
- USN-2128-1
- USN-2128-1
- USN-2129-1
- USN-2129-1
- USN-2136-1
- USN-2136-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1033593
- https://bugzilla.redhat.com/show_bug.cgi?id=1033593
- https://github.com/torvalds/linux/commit/b4789b8e6be3151a955ade74872822f30e8cd914
- https://github.com/torvalds/linux/commit/b4789b8e6be3151a955ade74872822f30e8cd914
Modified: 2024-11-21
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6fb392b1a63ae36c31f62bc3fc8630b49d602b62
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6fb392b1a63ae36c31f62bc3fc8630b49d602b62
- RHSA-2014:0159
- RHSA-2014:0159
- RHSA-2014:0284
- RHSA-2014:0284
- RHSA-2014:0285
- RHSA-2014:0285
- [oss-security] 20131122 Linux kernel CVE fixes
- [oss-security] 20131122 Linux kernel CVE fixes
- 63890
- 63890
- https://bugzilla.redhat.com/show_bug.cgi?id=1033600
- https://bugzilla.redhat.com/show_bug.cgi?id=1033600
- https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
- https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
Modified: 2024-11-21
CVE-2013-6382
Multiple buffer underflows in the XFS implementation in the Linux kernel through 3.12.1 allow local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for a (1) XFS_IOC_ATTRLIST_BY_HANDLE or (2) XFS_IOC_ATTRLIST_BY_HANDLE_32 ioctl call with a crafted length value, related to the xfs_attrlist_by_handle function in fs/xfs/xfs_ioctl.c and the xfs_compat_attrlist_by_handle function in fs/xfs/xfs_ioctl32.c.
- [oss-security] 20131122 Linux kernel CVE fixes
- [oss-security] 20131122 Linux kernel CVE fixes
- 63889
- 63889
- [xfs] 20131031 [patch] xfs: underflow bug in xfs_attrlist_by_handle()
- [xfs] 20131031 [patch] xfs: underflow bug in xfs_attrlist_by_handle()
- USN-2109-1
- USN-2109-1
- USN-2110-1
- USN-2110-1
- USN-2113-1
- USN-2113-1
- USN-2117-1
- USN-2117-1
- USN-2128-1
- USN-2128-1
- USN-2129-1
- USN-2129-1
- USN-2135-1
- USN-2135-1
- USN-2138-1
- USN-2138-1
- USN-2139-1
- USN-2139-1
- USN-2141-1
- USN-2141-1
- USN-2158-1
- USN-2158-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1033603
- https://bugzilla.redhat.com/show_bug.cgi?id=1033603
Modified: 2024-11-21
CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f856567b930dfcdbc3323261bf77240ccdde01f5
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f856567b930dfcdbc3323261bf77240ccdde01f5
- RHSA-2014:0100
- RHSA-2014:0100
- RHSA-2014:0285
- RHSA-2014:0285
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.8
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.8
- [oss-security] 20131122 Linux kernel CVE fixes
- [oss-security] 20131122 Linux kernel CVE fixes
- USN-2066-1
- USN-2066-1
- USN-2067-1
- USN-2067-1
- USN-2068-1
- USN-2068-1
- USN-2069-1
- USN-2069-1
- USN-2070-1
- USN-2070-1
- USN-2071-1
- USN-2071-1
- USN-2072-1
- USN-2072-1
- USN-2073-1
- USN-2073-1
- USN-2074-1
- USN-2074-1
- USN-2075-1
- USN-2075-1
- USN-2076-1
- USN-2076-1
- USN-2107-1
- USN-2107-1
- USN-2108-1
- USN-2108-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1033530
- https://bugzilla.redhat.com/show_bug.cgi?id=1033530
- https://github.com/torvalds/linux/commit/f856567b930dfcdbc3323261bf77240ccdde01f5
- https://github.com/torvalds/linux/commit/f856567b930dfcdbc3323261bf77240ccdde01f5
Modified: 2024-11-21
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
- openSUSE-SU-2014:0204
- openSUSE-SU-2014:0204
- RHSA-2014:0100
- RHSA-2014:0100
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.5
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.5
- [oss-security] 20131206 Re: CVE request: Linux kernel: net: fib: fib6_add: potential NULL pointer dereference
- [oss-security] 20131206 Re: CVE request: Linux kernel: net: fib: fib6_add: potential NULL pointer dereference
- https://bugzilla.redhat.com/show_bug.cgi?id=1039054
- https://bugzilla.redhat.com/show_bug.cgi?id=1039054
- https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
- https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
Modified: 2024-11-21
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cf970c002d270c36202bd5b9c2804d3097a52da0
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cf970c002d270c36202bd5b9c2804d3097a52da0
- openSUSE-SU-2014:0205
- openSUSE-SU-2014:0205
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- [oss-security] 20131206 Re: CVE request: Kernel: ping: NULL pointer dereference on write to msg_name
- [oss-security] 20131206 Re: CVE request: Kernel: ping: NULL pointer dereference on write to msg_name
- USN-2113-1
- USN-2113-1
- USN-2117-1
- USN-2117-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1039046
- https://bugzilla.redhat.com/show_bug.cgi?id=1039046
- https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
- https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
Modified: 2024-11-21
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7314e613d5ff9f0934f7a0f74ed7973b903315d1
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7314e613d5ff9f0934f7a0f74ed7973b903315d1
- [oss-security] 20131104 Re: some unstracked linux kernel security fixes
- [oss-security] 20131104 Re: some unstracked linux kernel security fixes
- USN-2064-1
- USN-2064-1
- USN-2065-1
- USN-2065-1
- USN-2066-1
- USN-2066-1
- USN-2067-1
- USN-2067-1
- USN-2068-1
- USN-2068-1
- USN-2069-1
- USN-2069-1
- USN-2070-1
- USN-2070-1
- USN-2071-1
- USN-2071-1
- USN-2072-1
- USN-2072-1
- USN-2073-1
- USN-2073-1
- USN-2074-1
- USN-2074-1
- USN-2075-1
- USN-2075-1
- USN-2076-1
- USN-2076-1
- https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
- https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
- https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.12.bz2
- https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.12.bz2
Modified: 2024-11-21
CVE-2013-7026
Multiple race conditions in ipc/shm.c in the Linux kernel before 3.12.2 allow local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted application that uses shmctl IPC_RMID operations in conjunction with other shm system calls.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a399b29dfbaaaf91162b2dc5a5875dd51bbfa2a1
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a399b29dfbaaaf91162b2dc5a5875dd51bbfa2a1
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.2
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.2
- USN-2070-1
- USN-2070-1
- USN-2075-1
- USN-2075-1
- https://github.com/torvalds/linux/commit/a399b29dfbaaaf91162b2dc5a5875dd51bbfa2a1
- https://github.com/torvalds/linux/commit/a399b29dfbaaaf91162b2dc5a5875dd51bbfa2a1
Modified: 2024-11-21
CVE-2013-7027
The ieee80211_radiotap_iterator_init function in net/wireless/radiotap.c in the Linux kernel before 3.11.7 does not check whether a frame contains any data outside of the header, which might allow attackers to cause a denial of service (buffer over-read) via a crafted header.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f5563318ff1bde15b10e736e97ffce13be08bc1a
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f5563318ff1bde15b10e736e97ffce13be08bc1a
- openSUSE-SU-2014:0204
- openSUSE-SU-2014:0204
- openSUSE-SU-2014:0247
- openSUSE-SU-2014:0247
- 55606
- 55606
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.7
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.7
- 64013
- 64013
- 1029413
- 1029413
- USN-2066-1
- USN-2066-1
- USN-2067-1
- USN-2067-1
- USN-2068-1
- USN-2068-1
- USN-2069-1
- USN-2069-1
- USN-2071-1
- USN-2071-1
- USN-2072-1
- USN-2072-1
- USN-2073-1
- USN-2073-1
- USN-2074-1
- USN-2074-1
- USN-2076-1
- USN-2076-1
- USN-2128-1
- USN-2128-1
- USN-2129-1
- USN-2129-1
- https://github.com/torvalds/linux/commit/f5563318ff1bde15b10e736e97ffce13be08bc1a
- https://github.com/torvalds/linux/commit/f5563318ff1bde15b10e736e97ffce13be08bc1a
Modified: 2024-11-21
CVE-2013-7263
The Linux kernel before 3.12.4 updates certain length values before ensuring that associated data structures have been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call, related to net/ipv4/ping.c, net/ipv4/raw.c, net/ipv4/udp.c, net/ipv6/raw.c, and net/ipv6/udp.c.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bceaa90240b6019ed73b49965eac7d167610be69
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bceaa90240b6019ed73b49965eac7d167610be69
- SUSE-SU-2014:0459
- SUSE-SU-2014:0459
- SUSE-SU-2015:0481
- SUSE-SU-2015:0481
- openSUSE-SU-2015:0566
- openSUSE-SU-2015:0566
- SUSE-SU-2015:0652
- SUSE-SU-2015:0652
- SUSE-SU-2015:0736
- SUSE-SU-2015:0736
- RHSA-2014:0159
- RHSA-2014:0159
- RHSA-2014:0285
- RHSA-2014:0285
- [oss-security] 20140107 oss-sec: CVE split and a missed file
- [oss-security] 20140107 oss-sec: CVE split and a missed file
- 55882
- 55882
- 56036
- 56036
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- [oss-security] 20131128 Re: CVE Request: Linux kernel: net: uninitialised memory leakage
- [oss-security] 20131128 Re: CVE Request: Linux kernel: net: uninitialised memory leakage
- USN-2107-1
- USN-2107-1
- USN-2108-1
- USN-2108-1
- USN-2109-1
- USN-2109-1
- USN-2110-1
- USN-2110-1
- USN-2113-1
- USN-2113-1
- USN-2117-1
- USN-2117-1
- USN-2135-1
- USN-2135-1
- USN-2136-1
- USN-2136-1
- USN-2138-1
- USN-2138-1
- USN-2139-1
- USN-2139-1
- USN-2141-1
- USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1035875
- https://bugzilla.redhat.com/show_bug.cgi?id=1035875
- https://github.com/torvalds/linux/commit/bceaa90240b6019ed73b49965eac7d167610be69
- https://github.com/torvalds/linux/commit/bceaa90240b6019ed73b49965eac7d167610be69
Modified: 2024-11-21
CVE-2013-7264
The l2tp_ip_recvmsg function in net/l2tp/l2tp_ip.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bceaa90240b6019ed73b49965eac7d167610be69
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bceaa90240b6019ed73b49965eac7d167610be69
- SUSE-SU-2014:0459
- SUSE-SU-2014:0459
- [oss-security] 20140107 oss-sec: CVE split and a missed file
- [oss-security] 20140107 oss-sec: CVE split and a missed file
- 55882
- 55882
- 56036
- 56036
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- [oss-security] 20131128 Re: CVE Request: Linux kernel: net: uninitialised memory leakage
- [oss-security] 20131128 Re: CVE Request: Linux kernel: net: uninitialised memory leakage
- USN-2107-1
- USN-2107-1
- USN-2108-1
- USN-2108-1
- USN-2109-1
- USN-2109-1
- USN-2110-1
- USN-2110-1
- USN-2113-1
- USN-2113-1
- USN-2117-1
- USN-2117-1
- USN-2135-1
- USN-2135-1
- USN-2136-1
- USN-2136-1
- USN-2138-1
- USN-2138-1
- USN-2139-1
- USN-2139-1
- USN-2141-1
- USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1035875
- https://bugzilla.redhat.com/show_bug.cgi?id=1035875
- https://github.com/torvalds/linux/commit/bceaa90240b6019ed73b49965eac7d167610be69
- https://github.com/torvalds/linux/commit/bceaa90240b6019ed73b49965eac7d167610be69
Modified: 2024-11-21
CVE-2013-7265
The pn_recvmsg function in net/phonet/datagram.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bceaa90240b6019ed73b49965eac7d167610be69
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bceaa90240b6019ed73b49965eac7d167610be69
- SUSE-SU-2014:0459
- SUSE-SU-2014:0459
- RHSA-2014:0159
- RHSA-2014:0159
- [oss-security] 20140107 oss-sec: CVE split and a missed file
- [oss-security] 20140107 oss-sec: CVE split and a missed file
- 55882
- 55882
- 56036
- 56036
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- [oss-security] 20131128 Re: CVE Request: Linux kernel: net: uninitialised memory leakage
- [oss-security] 20131128 Re: CVE Request: Linux kernel: net: uninitialised memory leakage
- USN-2107-1
- USN-2107-1
- USN-2108-1
- USN-2108-1
- USN-2109-1
- USN-2109-1
- USN-2110-1
- USN-2110-1
- USN-2113-1
- USN-2113-1
- USN-2117-1
- USN-2117-1
- USN-2135-1
- USN-2135-1
- USN-2136-1
- USN-2136-1
- USN-2138-1
- USN-2138-1
- USN-2139-1
- USN-2139-1
- USN-2141-1
- USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1035875
- https://bugzilla.redhat.com/show_bug.cgi?id=1035875
- https://github.com/torvalds/linux/commit/bceaa90240b6019ed73b49965eac7d167610be69
- https://github.com/torvalds/linux/commit/bceaa90240b6019ed73b49965eac7d167610be69
Modified: 2024-11-21
CVE-2013-7266
The mISDN_sock_recvmsg function in drivers/isdn/mISDN/socket.c in the Linux kernel before 3.12.4 does not ensure that a certain length value is consistent with the size of an associated data structure, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- 55882
- 55882
- 56036
- 56036
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- [oss-security] 20131231 Re: CVE request: Linux kernel: net: memory leak in recvmsg handlermsg_name & msg_namelen logic
- [oss-security] 20131231 Re: CVE request: Linux kernel: net: memory leak in recvmsg handlermsg_name & msg_namelen logic
- USN-2109-1
- USN-2109-1
- USN-2110-1
- USN-2110-1
- USN-2113-1
- USN-2113-1
- USN-2117-1
- USN-2117-1
- USN-2128-1
- USN-2128-1
- USN-2129-1
- USN-2129-1
- USN-2135-1
- USN-2135-1
- USN-2136-1
- USN-2136-1
- USN-2138-1
- USN-2138-1
- USN-2139-1
- USN-2139-1
- USN-2141-1
- USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1039845
- https://bugzilla.redhat.com/show_bug.cgi?id=1039845
- https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
Modified: 2024-11-21
CVE-2013-7267
The atalk_recvmsg function in net/appletalk/ddp.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- 55882
- 55882
- 56036
- 56036
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- [oss-security] 20131231 Re: CVE request: Linux kernel: net: memory leak in recvmsg handlermsg_name & msg_namelen logic
- [oss-security] 20131231 Re: CVE request: Linux kernel: net: memory leak in recvmsg handlermsg_name & msg_namelen logic
- USN-2109-1
- USN-2109-1
- USN-2110-1
- USN-2110-1
- USN-2113-1
- USN-2113-1
- USN-2117-1
- USN-2117-1
- USN-2128-1
- USN-2128-1
- USN-2129-1
- USN-2129-1
- USN-2135-1
- USN-2135-1
- USN-2136-1
- USN-2136-1
- USN-2138-1
- USN-2138-1
- USN-2139-1
- USN-2139-1
- USN-2141-1
- USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1039845
- https://bugzilla.redhat.com/show_bug.cgi?id=1039845
- https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
Modified: 2024-11-21
CVE-2013-7268
The ipx_recvmsg function in net/ipx/af_ipx.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- 55882
- 55882
- 56036
- 56036
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- [oss-security] 20131231 Re: CVE request: Linux kernel: net: memory leak in recvmsg handlermsg_name & msg_namelen logic
- [oss-security] 20131231 Re: CVE request: Linux kernel: net: memory leak in recvmsg handlermsg_name & msg_namelen logic
- USN-2109-1
- USN-2109-1
- USN-2110-1
- USN-2110-1
- USN-2113-1
- USN-2113-1
- USN-2117-1
- USN-2117-1
- USN-2128-1
- USN-2128-1
- USN-2129-1
- USN-2129-1
- USN-2135-1
- USN-2135-1
- USN-2136-1
- USN-2136-1
- USN-2138-1
- USN-2138-1
- USN-2139-1
- USN-2139-1
- USN-2141-1
- USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1039845
- https://bugzilla.redhat.com/show_bug.cgi?id=1039845
- https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
Modified: 2024-11-21
CVE-2013-7269
The nr_recvmsg function in net/netrom/af_netrom.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- 55882
- 55882
- 56036
- 56036
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- [oss-security] 20131231 Re: CVE request: Linux kernel: net: memory leak in recvmsg handlermsg_name & msg_namelen logic
- [oss-security] 20131231 Re: CVE request: Linux kernel: net: memory leak in recvmsg handlermsg_name & msg_namelen logic
- 64742
- 64742
- USN-2109-1
- USN-2109-1
- USN-2110-1
- USN-2110-1
- USN-2113-1
- USN-2113-1
- USN-2117-1
- USN-2117-1
- USN-2128-1
- USN-2128-1
- USN-2129-1
- USN-2129-1
- USN-2135-1
- USN-2135-1
- USN-2136-1
- USN-2136-1
- USN-2138-1
- USN-2138-1
- USN-2139-1
- USN-2139-1
- USN-2141-1
- USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1039845
- https://bugzilla.redhat.com/show_bug.cgi?id=1039845
- linux-kernel-cve20137269-info-disc(90130)
- linux-kernel-cve20137269-info-disc(90130)
- https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
Modified: 2024-11-21
CVE-2013-7270
The packet_recvmsg function in net/packet/af_packet.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- 55882
- 55882
- 56036
- 56036
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- [oss-security] 20131231 Re: CVE request: Linux kernel: net: memory leak in recvmsg handlermsg_name & msg_namelen logic
- [oss-security] 20131231 Re: CVE request: Linux kernel: net: memory leak in recvmsg handlermsg_name & msg_namelen logic
- 64744
- 64744
- USN-2109-1
- USN-2109-1
- USN-2110-1
- USN-2110-1
- USN-2113-1
- USN-2113-1
- USN-2117-1
- USN-2117-1
- USN-2128-1
- USN-2128-1
- USN-2129-1
- USN-2129-1
- USN-2135-1
- USN-2135-1
- USN-2136-1
- USN-2136-1
- USN-2138-1
- USN-2138-1
- USN-2139-1
- USN-2139-1
- USN-2141-1
- USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1039845
- https://bugzilla.redhat.com/show_bug.cgi?id=1039845
- linux-kernel-cve20137270-info-disc(90131)
- linux-kernel-cve20137270-info-disc(90131)
- https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
Modified: 2024-11-21
CVE-2013-7271
The x25_recvmsg function in net/x25/af_x25.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- 55882
- 55882
- 56036
- 56036
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- [oss-security] 20131231 Re: CVE request: Linux kernel: net: memory leak in recvmsg handlermsg_name & msg_namelen logic
- [oss-security] 20131231 Re: CVE request: Linux kernel: net: memory leak in recvmsg handlermsg_name & msg_namelen logic
- 64746
- 64746
- USN-2109-1
- USN-2109-1
- USN-2110-1
- USN-2110-1
- USN-2113-1
- USN-2113-1
- USN-2117-1
- USN-2117-1
- USN-2128-1
- USN-2128-1
- USN-2129-1
- USN-2129-1
- USN-2135-1
- USN-2135-1
- USN-2136-1
- USN-2136-1
- USN-2138-1
- USN-2138-1
- USN-2139-1
- USN-2139-1
- USN-2141-1
- USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1039845
- https://bugzilla.redhat.com/show_bug.cgi?id=1039845
- linux-kernel-cve20137271-info-disc(90132)
- linux-kernel-cve20137271-info-disc(90132)
- https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
Modified: 2024-11-21
CVE-2013-7281
The dgram_recvmsg function in net/ieee802154/dgram.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bceaa90240b6019ed73b49965eac7d167610be69
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bceaa90240b6019ed73b49965eac7d167610be69
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- [oss-security] 20131128 Re: CVE Request: Linux kernel: net: uninitialised memory leakage
- [oss-security] 20131128 Re: CVE Request: Linux kernel: net: uninitialised memory leakage
- 64747
- 64747
- 1029566
- 1029566
- USN-2107-1
- USN-2107-1
- USN-2108-1
- USN-2108-1
- USN-2109-1
- USN-2109-1
- USN-2110-1
- USN-2110-1
- USN-2113-1
- USN-2113-1
- USN-2117-1
- USN-2117-1
- USN-2135-1
- USN-2135-1
- USN-2136-1
- USN-2136-1
- USN-2138-1
- USN-2138-1
- USN-2139-1
- USN-2139-1
- USN-2141-1
- USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1035875
- https://bugzilla.redhat.com/show_bug.cgi?id=1035875
- linux-kernel-cve20137281-info-disc(90222)
- linux-kernel-cve20137281-info-disc(90222)
- https://github.com/torvalds/linux/commit/bceaa90240b6019ed73b49965eac7d167610be69
- https://github.com/torvalds/linux/commit/bceaa90240b6019ed73b49965eac7d167610be69
Modified: 2024-11-21
CVE-2013-7339
The rds_ib_laddr_check function in net/rds/ib.c in the Linux kernel before 3.12.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c2349758acf1874e4c2b93fe41d072336f1a31d0
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c2349758acf1874e4c2b93fe41d072336f1a31d0
- 59386
- 59386
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.8
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.8
- [oss-security] 20140320 CVE-2013-7339 Linux kernel - rds: prevent dereference of a NULL device
- [oss-security] 20140320 CVE-2013-7339 Linux kernel - rds: prevent dereference of a NULL device
- 66351
- 66351
- https://bugzilla.redhat.com/show_bug.cgi?id=1079214
- https://bugzilla.redhat.com/show_bug.cgi?id=1079214
- https://github.com/torvalds/linux/commit/c2349758acf1874e4c2b93fe41d072336f1a31d0
- https://github.com/torvalds/linux/commit/c2349758acf1874e4c2b93fe41d072336f1a31d0
Modified: 2024-11-21
CVE-2013-7348
Double free vulnerability in the ioctx_alloc function in fs/aio.c in the Linux kernel before 3.12.4 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via vectors involving an error condition in the aio_setup_ring function.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d558023207e008a4476a3b7bb8706b2a2bf5d84f
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d558023207e008a4476a3b7bb8706b2a2bf5d84f
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- [oss-security] 20140331 CVE-2013-7348 CVE-2014-2678 Linux kernel aio and rds issues
- [oss-security] 20140331 CVE-2013-7348 CVE-2014-2678 Linux kernel aio and rds issues
- https://github.com/torvalds/linux/commit/d558023207e008a4476a3b7bb8706b2a2bf5d84f
- https://github.com/torvalds/linux/commit/d558023207e008a4476a3b7bb8706b2a2bf5d84f
Modified: 2024-11-21
CVE-2013-7470
cipso_v4_validate in include/net/cipso_ipv4.h in the Linux kernel before 3.11.7, when CONFIG_NETLABEL is disabled, allows attackers to cause a denial of service (infinite loop and crash), as demonstrated by icmpsic, a different vulnerability than CVE-2013-0310.
- https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.7
- https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.7
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f2e5ddcc0d12f9c4c7b254358ad245c9dddce13b
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f2e5ddcc0d12f9c4c7b254358ad245c9dddce13b
- https://github.com/torvalds/linux/commit/f2e5ddcc0d12f9c4c7b254358ad245c9dddce13b
- https://github.com/torvalds/linux/commit/f2e5ddcc0d12f9c4c7b254358ad245c9dddce13b
- https://support.f5.com/csp/article/K21914362
- https://support.f5.com/csp/article/K21914362
- https://www.arista.com/en/support/advisories-notices/security-advisories/7098-security-advisory-40
- https://www.arista.com/en/support/advisories-notices/security-advisories/7098-security-advisory-40
Modified: 2024-11-21
CVE-2014-1438
The restore_fpu_checking function in arch/x86/include/asm/fpu-internal.h in the Linux kernel before 3.12.8 on the AMD K7 and K8 platforms does not clear pending exceptions before proceeding to an EMMS instruction, which allows local users to cause a denial of service (task kill) or possibly gain privileges via a crafted application.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=26bef1318adc1b3a530ecc807ef99346db2aa8b0
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=26bef1318adc1b3a530ecc807ef99346db2aa8b0
- FEDORA-2014-1072
- FEDORA-2014-1072
- FEDORA-2014-1062
- FEDORA-2014-1062
- http://www.halfdog.net/Security/2013/Vm86SyscallTaskSwitchKernelPanic/
- http://www.halfdog.net/Security/2013/Vm86SyscallTaskSwitchKernelPanic/
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.8
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.8
- MDVSA-2014:038
- MDVSA-2014:038
- [oss-security] 20140114 Re: Linux kernel: missing CPU-state sanitation during task-switch causes DOS / privilege escalation
- [oss-security] 20140114 Re: Linux kernel: missing CPU-state sanitation during task-switch causes DOS / privilege escalation
- 64781
- 64781
- 1029592
- 1029592
- USN-2113-1
- USN-2113-1
- USN-2117-1
- USN-2117-1
- USN-2133-1
- USN-2133-1
- USN-2134-1
- USN-2134-1
- USN-2135-1
- USN-2135-1
- USN-2136-1
- USN-2136-1
- USN-2138-1
- USN-2138-1
- USN-2139-1
- USN-2139-1
- USN-2141-1
- USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1052914
- https://bugzilla.redhat.com/show_bug.cgi?id=1052914
- https://github.com/torvalds/linux/commit/26bef1318adc1b3a530ecc807ef99346db2aa8b0
- https://github.com/torvalds/linux/commit/26bef1318adc1b3a530ecc807ef99346db2aa8b0
- [linux-kernel] 20140110 Re: Sanitize CPU-state when switching tasks (was sanitize CPU-state when switching from virtual-8086 mode to other task)
- [linux-kernel] 20140110 Re: Sanitize CPU-state when switching tasks (was sanitize CPU-state when switching from virtual-8086 mode to other task)
Modified: 2024-11-21
CVE-2014-1444
The fst_get_iface function in drivers/net/wan/farsync.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCWANDEV ioctl call.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=96b340406724d87e4621284ebac5e059d67b2194
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=96b340406724d87e4621284ebac5e059d67b2194
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.7
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.7
- [oss-security] 20140115 Re: CVE request: assorted kernel infoleak security fixes
- [oss-security] 20140115 Re: CVE request: assorted kernel infoleak security fixes
- 64952
- 64952
- USN-2128-1
- USN-2128-1
- USN-2129-1
- USN-2129-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1053610
- https://bugzilla.redhat.com/show_bug.cgi?id=1053610
- linux-kernel-cve20141444-info-disc(90443)
- linux-kernel-cve20141444-info-disc(90443)
- https://github.com/torvalds/linux/commit/96b340406724d87e4621284ebac5e059d67b2194
- https://github.com/torvalds/linux/commit/96b340406724d87e4621284ebac5e059d67b2194
Modified: 2024-11-21
CVE-2014-1445
The wanxl_ioctl function in drivers/net/wan/wanxl.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via an ioctl call.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2b13d06c9584b4eb773f1e80bbaedab9a1c344e1
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2b13d06c9584b4eb773f1e80bbaedab9a1c344e1
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.7
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.7
- [oss-security] 20140115 Re: CVE request: assorted kernel infoleak security fixes
- [oss-security] 20140115 Re: CVE request: assorted kernel infoleak security fixes
- 64953
- 64953
- USN-2128-1
- USN-2128-1
- USN-2129-1
- USN-2129-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1053613
- https://bugzilla.redhat.com/show_bug.cgi?id=1053613
- linux-kernel-cve20141445-info-disc(90444)
- linux-kernel-cve20141445-info-disc(90444)
- https://github.com/torvalds/linux/commit/2b13d06c9584b4eb773f1e80bbaedab9a1c344e1
- https://github.com/torvalds/linux/commit/2b13d06c9584b4eb773f1e80bbaedab9a1c344e1
Modified: 2024-11-21
CVE-2014-1446
The yam_ioctl function in drivers/net/hamradio/yam.c in the Linux kernel before 3.12.8 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCYAMGCFG ioctl call.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8e3fbf870481eb53b2d3a322d1fc395ad8b367ed
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8e3fbf870481eb53b2d3a322d1fc395ad8b367ed
- FEDORA-2014-1072
- FEDORA-2014-1072
- FEDORA-2014-1062
- FEDORA-2014-1062
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.8
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.8
- MDVSA-2014:038
- MDVSA-2014:038
- [oss-security] 20140115 Re: CVE request: assorted kernel infoleak security fixes
- [oss-security] 20140115 Re: CVE request: assorted kernel infoleak security fixes
- 64954
- 64954
- USN-2113-1
- USN-2113-1
- USN-2117-1
- USN-2117-1
- USN-2128-1
- USN-2128-1
- USN-2129-1
- USN-2129-1
- USN-2133-1
- USN-2133-1
- USN-2134-1
- USN-2134-1
- USN-2135-1
- USN-2135-1
- USN-2136-1
- USN-2136-1
- USN-2138-1
- USN-2138-1
- USN-2139-1
- USN-2139-1
- USN-2141-1
- USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1053620
- https://bugzilla.redhat.com/show_bug.cgi?id=1053620
- linux-kernel-cve20141446-info-disc(90445)
- linux-kernel-cve20141446-info-disc(90445)
- https://github.com/torvalds/linux/commit/8e3fbf870481eb53b2d3a322d1fc395ad8b367ed
- https://github.com/torvalds/linux/commit/8e3fbf870481eb53b2d3a322d1fc395ad8b367ed
Modified: 2024-11-21
CVE-2014-1690
The help function in net/netfilter/nf_nat_irc.c in the Linux kernel before 3.12.8 allows remote attackers to obtain sensitive information from kernel memory by establishing an IRC DCC session in which incorrect packet data is transmitted during use of the NAT mangle feature.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2690d97ade05c5325cbf7c72b94b90d265659886
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2690d97ade05c5325cbf7c72b94b90d265659886
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.8
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.8
- [oss-security] 20140128 Re: CVE request Linux kernel: netfilter: nf_nat: leakage of uninitialized buffer in IRC NAT helper
- [oss-security] 20140128 Re: CVE request Linux kernel: netfilter: nf_nat: leakage of uninitialized buffer in IRC NAT helper
- USN-2137-1
- USN-2137-1
- USN-2140-1
- USN-2140-1
- USN-2158-1
- USN-2158-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1058748
- https://bugzilla.redhat.com/show_bug.cgi?id=1058748
- https://github.com/torvalds/linux/commit/2690d97ade05c5325cbf7c72b94b90d265659886
- https://github.com/torvalds/linux/commit/2690d97ade05c5325cbf7c72b94b90d265659886
Modified: 2024-11-21
CVE-2014-2672
Race condition in the ath_tx_aggr_sleep function in drivers/net/wireless/ath/ath9k/xmit.c in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via a large amount of network traffic that triggers certain list deletions.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=21f8aaee0c62708654988ce092838aa7df4d25d8
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=21f8aaee0c62708654988ce092838aa7df4d25d8
- 57468
- 57468
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.7
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.7
- [oss-security] 20140330 Re: CVE request: Linux Kernel, two security issues
- [oss-security] 20140330 Re: CVE request: Linux Kernel, two security issues
- 66492
- 66492
- https://bugzilla.kernel.org/show_bug.cgi?id=70551
- https://bugzilla.kernel.org/show_bug.cgi?id=70551
- https://github.com/torvalds/linux/commit/21f8aaee0c62708654988ce092838aa7df4d25d8
- https://github.com/torvalds/linux/commit/21f8aaee0c62708654988ce092838aa7df4d25d8
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.15
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.15
Modified: 2024-11-21
CVE-2014-3645
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.12 does not have an exit handler for the INVEPT instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bfd0a56b90005f8c8a004baf407ad90045c2b11e
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bfd0a56b90005f8c8a004baf407ad90045c2b11e
- RHSA-2015:0126
- RHSA-2015:0126
- RHSA-2015:0284
- RHSA-2015:0284
- DSA-3060
- DSA-3060
- [oss-security] 20141024 kvm issues
- [oss-security] 20141024 kvm issues
- USN-2417-1
- USN-2417-1
- USN-2418-1
- USN-2418-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1144835
- https://bugzilla.redhat.com/show_bug.cgi?id=1144835
- https://github.com/torvalds/linux/commit/bfd0a56b90005f8c8a004baf407ad90045c2b11e
- https://github.com/torvalds/linux/commit/bfd0a56b90005f8c8a004baf407ad90045c2b11e
Modified: 2024-11-21
CVE-2014-8173
The pmd_none_or_trans_huge_or_clear_bad function in include/asm-generic/pgtable.h in the Linux kernel before 3.13 on NUMA systems does not properly determine whether a Page Middle Directory (PMD) entry is a transparent huge-table entry, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted MADV_WILLNEED madvise system call that leverages the absence of a page-table lock.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ee53664bda169f519ce3c6a22d378f0b946c8178
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ee53664bda169f519ce3c6a22d378f0b946c8178
- openSUSE-SU-2015:0714
- openSUSE-SU-2015:0714
- RHSA-2015:0290
- RHSA-2015:0290
- RHSA-2015:0694
- RHSA-2015:0694
- https://bugzilla.redhat.com/show_bug.cgi?id=1198457
- https://bugzilla.redhat.com/show_bug.cgi?id=1198457
- https://github.com/torvalds/linux/commit/ee53664bda169f519ce3c6a22d378f0b946c8178
- https://github.com/torvalds/linux/commit/ee53664bda169f519ce3c6a22d378f0b946c8178
Modified: 2024-11-21
CVE-2014-9870
The Linux kernel before 3.11 on ARM platforms, as used in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices, does not properly consider user-space access to the TPIDRURW register, which allows local users to gain privileges via a crafted application, aka Android internal bug 28749743 and Qualcomm internal bug CR561044.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a4780adeefd042482f624f5e0d577bf9cdcbb760
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a4780adeefd042482f624f5e0d577bf9cdcbb760
- http://source.android.com/security/bulletin/2016-08-01.html
- http://source.android.com/security/bulletin/2016-08-01.html
- 92219
- 92219
- https://github.com/torvalds/linux/commit/a4780adeefd042482f624f5e0d577bf9cdcbb760
- https://github.com/torvalds/linux/commit/a4780adeefd042482f624f5e0d577bf9cdcbb760
- https://source.codeaurora.org/quic/la/kernel/msm/commit/?id=4f57652fcd2dce7741f1ac6dc0417e2f265cd1de
- https://source.codeaurora.org/quic/la/kernel/msm/commit/?id=4f57652fcd2dce7741f1ac6dc0417e2f265cd1de
Modified: 2024-11-21
CVE-2014-9895
drivers/media/media-device.c in the Linux kernel before 3.11, as used in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices, does not properly initialize certain data structures, which allows local users to obtain sensitive information via a crafted application, aka Android internal bug 28750150 and Qualcomm internal bug CR570757, a different vulnerability than CVE-2014-1739.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c88e739b1fad662240e99ecbd0bdaac871717987
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c88e739b1fad662240e99ecbd0bdaac871717987
- http://source.android.com/security/bulletin/2016-08-01.html
- http://source.android.com/security/bulletin/2016-08-01.html
- 92222
- 92222
- https://github.com/torvalds/linux/commit/c88e739b1fad662240e99ecbd0bdaac871717987
- https://github.com/torvalds/linux/commit/c88e739b1fad662240e99ecbd0bdaac871717987
- https://source.codeaurora.org/quic/la/kernel/msm/commit/?id=cc4b26575602e492efd986e9a6ffc4278cee53b5
- https://source.codeaurora.org/quic/la/kernel/msm/commit/?id=cc4b26575602e492efd986e9a6ffc4278cee53b5
Modified: 2024-11-21
CVE-2018-14634
An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.
- [oss-security] 20210720 CVE-2021-33910: Denial of service (stack exhaustion) in systemd (PID 1)
- 105407
- RHSA-2018:2748
- RHSA-2018:2763
- RHSA-2018:2846
- RHSA-2018:2924
- RHSA-2018:2925
- RHSA-2018:2933
- RHSA-2018:3540
- RHSA-2018:3586
- RHSA-2018:3590
- RHSA-2018:3591
- RHSA-2018:3643
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14634
- https://security.netapp.com/advisory/ntap-20190204-0002/
- https://security.paloaltonetworks.com/CVE-2018-14634
- https://support.f5.com/csp/article/K20934447?utm_source=f5support&%3Butm_medium=RSS
- USN-3775-1
- USN-3775-2
- USN-3779-1
- 45516
- [oss-security] 20180925 Integer overflow in Linux's create_elf_tables() (CVE-2018-14634)
- [oss-security] 20210720 CVE-2021-33910: Denial of service (stack exhaustion) in systemd (PID 1)
- [oss-security] 20180925 Integer overflow in Linux's create_elf_tables() (CVE-2018-14634)
- 45516
- USN-3779-1
- USN-3775-2
- USN-3775-1
- https://support.f5.com/csp/article/K20934447?utm_source=f5support&%3Butm_medium=RSS
- https://security.paloaltonetworks.com/CVE-2018-14634
- https://security.netapp.com/advisory/ntap-20190204-0002/
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14634
- RHSA-2018:3643
- RHSA-2018:3591
- RHSA-2018:3590
- RHSA-2018:3586
- RHSA-2018:3540
- RHSA-2018:2933
- RHSA-2018:2925
- RHSA-2018:2924
- RHSA-2018:2846
- RHSA-2018:2763
- RHSA-2018:2748
- 105407
Modified: 2024-11-21
CVE-2018-16885
A flaw was found in the Linux kernel that allows the userspace to call memcpy_fromiovecend() and similar functions with a zero offset and buffer length which causes the read beyond the buffer boundaries, in certain cases causing a memory access fault and a system halt by accessing invalid memory address. This issue only affects kernel version 3.10.x as shipped with Red Hat Enterprise Linux 7.
Modified: 2024-11-21
CVE-2019-3874
The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are believed to be vulnerable.
- RHSA-2019:3309
- RHSA-2019:3309
- RHSA-2019:3517
- RHSA-2019:3517
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3874
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3874
- [debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
- [debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
- https://security.netapp.com/advisory/ntap-20190411-0003/
- https://security.netapp.com/advisory/ntap-20190411-0003/
- USN-3979-1
- USN-3979-1
- USN-3980-1
- USN-3980-1
- USN-3980-2
- USN-3980-2
- USN-3981-1
- USN-3981-1
- USN-3981-2
- USN-3981-2
- USN-3982-1
- USN-3982-1
- USN-3982-2
- USN-3982-2
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
Modified: 2024-11-21
CVE-2022-1016
A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.
- http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/
- http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/
- https://access.redhat.com/security/cve/CVE-2022-1016
- https://access.redhat.com/security/cve/CVE-2022-1016
- https://bugzilla.redhat.com/show_bug.cgi?id=2066614
- https://bugzilla.redhat.com/show_bug.cgi?id=2066614
- https://seclists.org/oss-sec/2022/q1/205
- https://seclists.org/oss-sec/2022/q1/205
Closed bugs
Обновить версию до текущей в Сизифе
Closed vulnerabilities
BDU:2015-00130
Уязвимость программного обеспечения Cisco IPS, позволяющая злоумышленнику получить одноразовый код (nonce) ECDSA
BDU:2015-00131
Уязвимость программного обеспечения Cisco Unified Communications Manager, позволяющая злоумышленнику получить одноразовый код (nonce) ECDSA
BDU:2015-01314
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить целостность и доступность защищаемой информации
BDU:2015-09745
Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-09760
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-09775
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2013-4353
The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=blob_plain%3Bf=CHANGES%3Bhb=refs/heads/OpenSSL_1_0_1-stable
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=blob_plain%3Bf=CHANGES%3Bhb=refs/heads/OpenSSL_1_0_1-stable
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=197e0ea817ad64820789d86711d55ff50d71f631
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=197e0ea817ad64820789d86711d55ff50d71f631
- FEDORA-2014-9301
- FEDORA-2014-9301
- FEDORA-2014-9308
- FEDORA-2014-9308
- openSUSE-SU-2014:0094
- openSUSE-SU-2014:0094
- openSUSE-SU-2014:0096
- openSUSE-SU-2014:0096
- openSUSE-SU-2014:0099
- openSUSE-SU-2014:0099
- RHSA-2014:0015
- RHSA-2014:0015
- RHSA-2014:0041
- RHSA-2014:0041
- DSA-2837
- DSA-2837
- http://www.openssl.org/news/vulnerabilities.html
- http://www.openssl.org/news/vulnerabilities.html
- http://www.splunk.com/view/SP-CAAAMB3
- http://www.splunk.com/view/SP-CAAAMB3
- USN-2079-1
- USN-2079-1
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- https://bugzilla.redhat.com/show_bug.cgi?id=1049058
- https://bugzilla.redhat.com/show_bug.cgi?id=1049058
Modified: 2024-11-21
CVE-2013-6449
The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client.
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=ca989269a2876bae79393bd54c3e72d49975fc75
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=ca989269a2876bae79393bd54c3e72d49975fc75
- FEDORA-2013-23768
- FEDORA-2013-23768
- FEDORA-2013-23788
- FEDORA-2013-23788
- FEDORA-2013-23794
- FEDORA-2013-23794
- FEDORA-2014-9301
- FEDORA-2014-9301
- FEDORA-2014-9308
- FEDORA-2014-9308
- openSUSE-SU-2014:0012
- openSUSE-SU-2014:0012
- openSUSE-SU-2014:0015
- openSUSE-SU-2014:0015
- openSUSE-SU-2014:0018
- openSUSE-SU-2014:0018
- openSUSE-SU-2014:0048
- openSUSE-SU-2014:0048
- RHSA-2014:0015
- RHSA-2014:0015
- RHSA-2014:0041
- RHSA-2014:0041
- http://rt.openssl.org/Ticket/Display.html?id=3200&user=guest&pass=guest
- http://rt.openssl.org/Ticket/Display.html?id=3200&user=guest&pass=guest
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- GLSA-201412-39
- GLSA-201412-39
- DSA-2833
- DSA-2833
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 64530
- 64530
- 1029548
- 1029548
- USN-2079-1
- USN-2079-1
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- https://bugzilla.redhat.com/show_bug.cgi?id=1045363
- https://bugzilla.redhat.com/show_bug.cgi?id=1045363
- https://issues.apache.org/jira/browse/TS-2355
- https://issues.apache.org/jira/browse/TS-2355
Modified: 2024-11-21
CVE-2013-6450
The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c.
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=34628967f1e65dc8f34e000f0f5518e21afbfc7b
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=34628967f1e65dc8f34e000f0f5518e21afbfc7b
- FEDORA-2014-9301
- FEDORA-2014-9301
- FEDORA-2014-9308
- FEDORA-2014-9308
- openSUSE-SU-2014:0048
- openSUSE-SU-2014:0048
- openSUSE-SU-2014:0049
- openSUSE-SU-2014:0049
- RHSA-2014:0015
- RHSA-2014:0015
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- GLSA-201412-39
- GLSA-201412-39
- DSA-2833
- DSA-2833
- http://www.openssl.org/news/vulnerabilities.html
- http://www.openssl.org/news/vulnerabilities.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 64618
- 64618
- 1029549
- 1029549
- 1031594
- 1031594
- USN-2079-1
- USN-2079-1
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- https://puppet.com/security/cve/cve-2013-6450
- https://puppet.com/security/cve/cve-2013-6450
- https://security-tracker.debian.org/tracker/CVE-2013-6450
- https://security-tracker.debian.org/tracker/CVE-2013-6450
Modified: 2024-11-21
CVE-2014-0076
The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.
- http://advisories.mageia.org/MGASA-2014-0165.html
- http://advisories.mageia.org/MGASA-2014-0165.html
- http://eprint.iacr.org/2014/140
- http://eprint.iacr.org/2014/140
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=2198be3483259de374f91e57d247d0fc667aef29
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=2198be3483259de374f91e57d247d0fc667aef29
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629
- openSUSE-SU-2016:0640
- openSUSE-SU-2016:0640
- openSUSE-SU-2014:0480
- openSUSE-SU-2014:0480
- HPSBUX03046
- HPSBUX03046
- SSRT101590
- SSRT101590
- HPSBOV03047
- HPSBOV03047
- HPSBMU03057
- HPSBMU03057
- HPSBMU03056
- HPSBMU03056
- HPSBMU03051
- HPSBMU03051
- HPSBGN03050
- HPSBGN03050
- HPSBMU03074
- HPSBMU03074
- HPSBMU03062
- HPSBMU03062
- HPSBMU03076
- HPSBMU03076
- 58492
- 58492
- 58727
- 58727
- 58939
- 58939
- 59040
- 59040
- 59162
- 59162
- 59175
- 59175
- 59264
- 59264
- 59300
- 59300
- 59364
- 59364
- 59374
- 59374
- 59413
- 59413
- 59438
- 59438
- 59445
- 59445
- 59450
- 59450
- 59454
- 59454
- 59490
- 59490
- 59495
- 59495
- 59514
- 59514
- 59655
- 59655
- 59721
- 59721
- 60571
- 60571
- http://support.apple.com/kb/HT6443
- http://support.apple.com/kb/HT6443
- 20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products
- 20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products
- http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm
- http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm
- MDVSA-2014:067
- MDVSA-2014:067
- MDVSA-2015:062
- MDVSA-2015:062
- http://www.novell.com/support/kb/doc.php?id=7015264
- http://www.novell.com/support/kb/doc.php?id=7015264
- http://www.novell.com/support/kb/doc.php?id=7015300
- http://www.novell.com/support/kb/doc.php?id=7015300
- http://www.openssl.org/news/secadv_20140605.txt
- http://www.openssl.org/news/secadv_20140605.txt
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- 66363
- 66363
- USN-2165-1
- USN-2165-1
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://www-01.ibm.com/support/docview.wss?uid=swg21673137
- http://www-01.ibm.com/support/docview.wss?uid=swg21673137
- http://www-01.ibm.com/support/docview.wss?uid=swg21676035
- http://www-01.ibm.com/support/docview.wss?uid=swg21676035
- http://www-01.ibm.com/support/docview.wss?uid=swg21676062
- http://www-01.ibm.com/support/docview.wss?uid=swg21676062
- http://www-01.ibm.com/support/docview.wss?uid=swg21676092
- http://www-01.ibm.com/support/docview.wss?uid=swg21676092
- http://www-01.ibm.com/support/docview.wss?uid=swg21676419
- http://www-01.ibm.com/support/docview.wss?uid=swg21676419
- http://www-01.ibm.com/support/docview.wss?uid=swg21676424
- http://www-01.ibm.com/support/docview.wss?uid=swg21676424
- http://www-01.ibm.com/support/docview.wss?uid=swg21676501
- http://www-01.ibm.com/support/docview.wss?uid=swg21676501
- http://www-01.ibm.com/support/docview.wss?uid=swg21676655
- http://www-01.ibm.com/support/docview.wss?uid=swg21676655
- http://www-01.ibm.com/support/docview.wss?uid=swg21677695
- http://www-01.ibm.com/support/docview.wss?uid=swg21677695
- http://www-01.ibm.com/support/docview.wss?uid=swg21677828
- http://www-01.ibm.com/support/docview.wss?uid=swg21677828
- https://bugs.gentoo.org/show_bug.cgi?id=505278
- https://bugs.gentoo.org/show_bug.cgi?id=505278
- https://bugzilla.novell.com/show_bug.cgi?id=869945
- https://bugzilla.novell.com/show_bug.cgi?id=869945
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
- https://kc.mcafee.com/corporate/index?page=content&id=SB10075
- https://kc.mcafee.com/corporate/index?page=content&id=SB10075
Modified: 2024-11-21
CVE-2014-0160
The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
- http://advisories.mageia.org/MGASA-2014-0165.html
- http://advisories.mageia.org/MGASA-2014-0165.html
- http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/
- http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/
- http://cogentdatahub.com/ReleaseNotes.html
- http://cogentdatahub.com/ReleaseNotes.html
- http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-119-01
- http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-119-01
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=96db9023b881d7cd9f379b0c154650d6c108e9a3
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=96db9023b881d7cd9f379b0c154650d6c108e9a3
- http://heartbleed.com/
- http://heartbleed.com/
- FEDORA-2014-4879
- FEDORA-2014-4879
- FEDORA-2014-4910
- FEDORA-2014-4910
- FEDORA-2014-9308
- FEDORA-2014-9308
- openSUSE-SU-2014:0492
- openSUSE-SU-2014:0492
- SUSE-SA:2014:002
- SUSE-SA:2014:002
- openSUSE-SU-2014:0560
- openSUSE-SU-2014:0560
- HPSBMU02995
- HPSBMU02995
- HPSBMU02994
- HPSBMU02994
- HPSBMU02998
- HPSBMU02998
- HPSBMU02997
- HPSBMU02997
- HPSBST03001
- HPSBST03001
- HPSBMU02999
- HPSBMU02999
- HPSBGN03008
- HPSBGN03008
- HPSBGN03010
- HPSBGN03010
- HPSBMU03012
- HPSBMU03012
- HPSBMU03019
- HPSBMU03019
- HPSBMU03017
- HPSBMU03017
- HPSBMU03018
- HPSBMU03018
- HPSBST03015
- HPSBST03015
- HPSBMU03013
- HPSBMU03013
- HPSBGN03011
- HPSBGN03011
- HPSBHF03021
- HPSBHF03021
- HPSBPI03014
- HPSBPI03014
- HPSBMU03020
- HPSBMU03020
- HPSBST03016
- HPSBST03016
- HPSBMU03023
- HPSBMU03023
- HPSBMU03025
- HPSBMU03025
- HPSBMU03022
- HPSBMU03022
- HPSBMU03024
- HPSBMU03024
- HPSBPI03031
- HPSBPI03031
- HPSBMU03029
- HPSBMU03029
- HPSBMU03028
- HPSBMU03028
- HPSBMU03033
- HPSBMU03033
- HPSBMU03030
- HPSBMU03030
- HPSBMU03032
- HPSBMU03032
- HPSBMU03009
- HPSBMU03009
- HPSBST03004
- HPSBST03004
- HPSBST03027
- HPSBST03027
- HPSBMU03040
- HPSBMU03040
- HPSBMU03044
- HPSBMU03044
- HPSBMU03037
- HPSBMU03037
- HPSBMU03062
- HPSBMU03062
- HPSBHF03136
- HPSBHF03136
- HPSBHF03293
- HPSBHF03293
- SSRT101846
- SSRT101846
- http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=1
- http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=1
- http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=3
- http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=3
- RHSA-2014:0376
- RHSA-2014:0376
- RHSA-2014:0377
- RHSA-2014:0377
- RHSA-2014:0378
- RHSA-2014:0378
- RHSA-2014:0396
- RHSA-2014:0396
- 20140409 Re: heartbleed OpenSSL bug CVE-2014-0160
- 20140409 Re: heartbleed OpenSSL bug CVE-2014-0160
- 20140411 MRI Rubies may contain statically linked, vulnerable OpenSSL
- 20140411 MRI Rubies may contain statically linked, vulnerable OpenSSL
- 20140412 Re: heartbleed OpenSSL bug CVE-2014-0160
- 20140412 Re: heartbleed OpenSSL bug CVE-2014-0160
- 20140408 heartbleed OpenSSL bug CVE-2014-0160
- 20140408 heartbleed OpenSSL bug CVE-2014-0160
- 20140408 Re: heartbleed OpenSSL bug CVE-2014-0160
- 20140408 Re: heartbleed OpenSSL bug CVE-2014-0160
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 57347
- 57347
- 57483
- 57483
- 57721
- 57721
- 57836
- 57836
- 57966
- 57966
- 57968
- 57968
- 59139
- 59139
- 59243
- 59243
- 59347
- 59347
- http://support.citrix.com/article/CTX140605
- http://support.citrix.com/article/CTX140605
- 20140409 OpenSSL Heartbeat Extension Vulnerability in Multiple Cisco Products
- 20140409 OpenSSL Heartbeat Extension Vulnerability in Multiple Cisco Products
- http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
- http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
- http://www.blackberry.com/btsc/KB35882
- http://www.blackberry.com/btsc/KB35882
- DSA-2896
- DSA-2896
- 32745
- 32745
- 32764
- 32764
- http://www.f-secure.com/en/web/labs_global/fsc-2014-1
- http://www.f-secure.com/en/web/labs_global/fsc-2014-1
- http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/
- http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/
- http://www.getchef.com/blog/2014/04/09/chef-server-heartbleed-cve-2014-0160-releases/
- http://www.getchef.com/blog/2014/04/09/chef-server-heartbleed-cve-2014-0160-releases/
- http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/
- http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/
- http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/
- http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/
- http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf
- http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf
- VU#720951
- VU#720951
- http://www.kerio.com/support/kerio-control/release-history
- http://www.kerio.com/support/kerio-control/release-history
- MDVSA-2015:062
- MDVSA-2015:062
- http://www.openssl.org/news/secadv_20140407.txt
- http://www.openssl.org/news/secadv_20140407.txt
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.html
- http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.html
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 66690
- 66690
- 1030026
- 1030026
- 1030074
- 1030074
- 1030077
- 1030077
- 1030078
- 1030078
- 1030079
- 1030079
- 1030080
- 1030080
- 1030081
- 1030081
- 1030082
- 1030082
- http://www.splunk.com/view/SP-CAAAMB3
- http://www.splunk.com/view/SP-CAAAMB3
- http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160512_00
- http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160512_00
- USN-2165-1
- USN-2165-1
- TA14-098A
- TA14-098A
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
- http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004661
- http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004661
- http://www-01.ibm.com/support/docview.wss?uid=swg21670161
- http://www-01.ibm.com/support/docview.wss?uid=swg21670161
- https://blog.torproject.org/blog/openssl-bug-cve-2014-0160
- https://blog.torproject.org/blog/openssl-bug-cve-2014-0160
- https://bugzilla.redhat.com/show_bug.cgi?id=1084875
- https://bugzilla.redhat.com/show_bug.cgi?id=1084875
- https://cert-portal.siemens.com/productcert/pdf/ssa-635659.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-635659.pdf
- https://code.google.com/p/mod-spdy/issues/detail?id=85
- https://code.google.com/p/mod-spdy/issues/detail?id=85
- https://filezilla-project.org/versions.php?type=server
- https://filezilla-project.org/versions.php?type=server
- https://gist.github.com/chapmajs/10473815
- https://gist.github.com/chapmajs/10473815
- HPSBST03000
- HPSBST03000
- [tomcat-dev] 20190319 svn commit: r1855831 [26/30] - in /tomcat/site/trunk: ./ docs/ xdocs/
- [tomcat-dev] 20190319 svn commit: r1855831 [26/30] - in /tomcat/site/trunk: ./ docs/ xdocs/
- [tomcat-dev] 20190325 svn commit: r1856174 [26/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
- [tomcat-dev] 20190325 svn commit: r1856174 [26/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
- [tomcat-dev] 20200213 svn commit: r1873980 [31/34] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200213 svn commit: r1873980 [31/34] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200203 svn commit: r1873527 [26/30] - /tomcat/site/trunk/docs/
- [tomcat-dev] 20200203 svn commit: r1873527 [26/30] - /tomcat/site/trunk/docs/
- [syslog-ng-announce] 20140411 syslog-ng Premium Edition 5 LTS (5.0.4a) has been released
- [syslog-ng-announce] 20140411 syslog-ng Premium Edition 5 LTS (5.0.4a) has been released
- https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html
- https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html
- https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html
- https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html
- https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html?sr=36517217
- https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html?sr=36517217
- https://www.cert.fi/en/reports/2014/vulnerability788210.html
- https://www.cert.fi/en/reports/2014/vulnerability788210.html
- https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008
- https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008
- https://yunus-shn.medium.com/ricon-industrial-cellular-router-heartbleed-attack-2634221c02bd
- https://yunus-shn.medium.com/ricon-industrial-cellular-router-heartbleed-attack-2634221c02bd