ALT-BU-2014-2775-1
Branch p7 update bulletin.
Package kernel-src-kvm updated to version 3.10.21-alt8 for branch p7 in task 119612.
Closed vulnerabilities
BDU:2015-04307
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
BDU:2015-04308
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
BDU:2015-04309
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
BDU:2015-04310
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
Modified: 2024-11-21
CVE-2014-0155
The ioapic_deliver function in virt/kvm/ioapic.c in the Linux kernel through 3.14.1 does not properly validate the kvm_irq_delivery_to_apic return value, which allows guest OS users to cause a denial of service (host OS crash) via a crafted entry in the redirection table of an I/O APIC. NOTE: the affected code was moved to the ioapic_service function before the vulnerability was announced.
- http://git.kernel.org/cgit/virt/kvm/kvm.git/commit/?id=5678de3f15010b9022ee45673f33bcfc71d47b60
- http://git.kernel.org/cgit/virt/kvm/kvm.git/commit/?id=5678de3f15010b9022ee45673f33bcfc71d47b60
- [oss-security] 20140407 CVE-2014-0155 -- kernel: kvm: BUG caused by invalid entry in guest ioapic redirection table
- [oss-security] 20140407 CVE-2014-0155 -- kernel: kvm: BUG caused by invalid entry in guest ioapic redirection table
- https://bugzilla.redhat.com/show_bug.cgi?id=1081589
- https://bugzilla.redhat.com/show_bug.cgi?id=1081589
Package kernel-image-led-ws updated to version 3.4.90-alt0.M70P.1 for branch p7 in task 119612.
Closed vulnerabilities
BDU:2014-00109
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии
BDU:2014-00333
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии
Modified: 2024-11-21
CVE-2014-0196
The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
- http://bugzilla.novell.com/show_bug.cgi?id=875690
- http://bugzilla.novell.com/show_bug.cgi?id=875690
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4291086b1f081b869c6d79e5b7441633dc3ace00
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4291086b1f081b869c6d79e5b7441633dc3ace00
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- SUSE-SU-2014:0667
- SUSE-SU-2014:0667
- SUSE-SU-2014:0683
- SUSE-SU-2014:0683
- http://pastebin.com/raw.php?i=yTSFUBgZ
- http://pastebin.com/raw.php?i=yTSFUBgZ
- RHSA-2014:0512
- RHSA-2014:0512
- 59218
- 59218
- 59262
- 59262
- 59599
- 59599
- http://source.android.com/security/bulletin/2016-07-01.html
- http://source.android.com/security/bulletin/2016-07-01.html
- http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15319.html
- http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15319.html
- DSA-2926
- DSA-2926
- DSA-2928
- DSA-2928
- 33516
- 33516
- [oss-security] 20140429 CVE-2014-0196: Linux kernel pty layer race condition memory corruption
- [oss-security] 20140429 CVE-2014-0196: Linux kernel pty layer race condition memory corruption
- 106646
- 106646
- USN-2196-1
- USN-2196-1
- USN-2197-1
- USN-2197-1
- USN-2198-1
- USN-2198-1
- USN-2199-1
- USN-2199-1
- USN-2200-1
- USN-2200-1
- USN-2201-1
- USN-2201-1
- USN-2202-1
- USN-2202-1
- USN-2203-1
- USN-2203-1
- USN-2204-1
- USN-2204-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1094232
- https://bugzilla.redhat.com/show_bug.cgi?id=1094232
- https://github.com/torvalds/linux/commit/4291086b1f081b869c6d79e5b7441633dc3ace00
- https://github.com/torvalds/linux/commit/4291086b1f081b869c6d79e5b7441633dc3ace00
Package kernel-image-un-def updated to version 3.14.4-alt1 for branch p7 in task 119816.
Closed vulnerabilities
BDU:2014-00052
Уязвимость операционной системы Linux, позволяющая злоумышленнику получить доступ к защищаемой информации
BDU:2014-00053
Уязвимость операционной системы Linux, позволяющая злоумышленнику получить доступ к защищаемой информации
BDU:2014-00062
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании
BDU:2014-00064
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании
BDU:2014-00109
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии
BDU:2014-00110
Уязвимость операционной системы Linux, позволяющая злоумышленнику повысить свои привилегии
BDU:2014-00111
Уязвимость операционной системы Linux, позволяющая злоумышленнику повысить свои привилегии
BDU:2014-00333
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии
BDU:2014-00334
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии
BDU:2015-04307
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
BDU:2015-04308
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
BDU:2015-04309
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
BDU:2015-04310
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
Modified: 2024-11-21
CVE-2014-0196
The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
- http://bugzilla.novell.com/show_bug.cgi?id=875690
- http://bugzilla.novell.com/show_bug.cgi?id=875690
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4291086b1f081b869c6d79e5b7441633dc3ace00
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4291086b1f081b869c6d79e5b7441633dc3ace00
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- SUSE-SU-2014:0667
- SUSE-SU-2014:0667
- SUSE-SU-2014:0683
- SUSE-SU-2014:0683
- http://pastebin.com/raw.php?i=yTSFUBgZ
- http://pastebin.com/raw.php?i=yTSFUBgZ
- RHSA-2014:0512
- RHSA-2014:0512
- 59218
- 59218
- 59262
- 59262
- 59599
- 59599
- http://source.android.com/security/bulletin/2016-07-01.html
- http://source.android.com/security/bulletin/2016-07-01.html
- http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15319.html
- http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15319.html
- DSA-2926
- DSA-2926
- DSA-2928
- DSA-2928
- 33516
- 33516
- [oss-security] 20140429 CVE-2014-0196: Linux kernel pty layer race condition memory corruption
- [oss-security] 20140429 CVE-2014-0196: Linux kernel pty layer race condition memory corruption
- 106646
- 106646
- USN-2196-1
- USN-2196-1
- USN-2197-1
- USN-2197-1
- USN-2198-1
- USN-2198-1
- USN-2199-1
- USN-2199-1
- USN-2200-1
- USN-2200-1
- USN-2201-1
- USN-2201-1
- USN-2202-1
- USN-2202-1
- USN-2203-1
- USN-2203-1
- USN-2204-1
- USN-2204-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1094232
- https://bugzilla.redhat.com/show_bug.cgi?id=1094232
- https://github.com/torvalds/linux/commit/4291086b1f081b869c6d79e5b7441633dc3ace00
- https://github.com/torvalds/linux/commit/4291086b1f081b869c6d79e5b7441633dc3ace00
Modified: 2024-11-21
CVE-2014-1737
The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly handle error conditions during processing of an FDRAWCMD ioctl call, which allows local users to trigger kfree operations and gain privileges by leveraging write access to a /dev/fd device.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ef87dbe7614341c2e7bfe8d32fcb7028cc97442c
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ef87dbe7614341c2e7bfe8d32fcb7028cc97442c
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- http://linux.oracle.com/errata/ELSA-2014-3043.html
- http://linux.oracle.com/errata/ELSA-2014-3043.html
- SUSE-SU-2014:0667
- SUSE-SU-2014:0667
- SUSE-SU-2014:0683
- SUSE-SU-2014:0683
- RHSA-2014:0800
- RHSA-2014:0800
- RHSA-2014:0801
- RHSA-2014:0801
- 59262
- 59262
- 59309
- 59309
- 59406
- 59406
- 59599
- 59599
- DSA-2926
- DSA-2926
- DSA-2928
- DSA-2928
- [oss-security] 20140509 Linux kernel floppy ioctl kernel code execution
- [oss-security] 20140509 Linux kernel floppy ioctl kernel code execution
- 67300
- 67300
- 1030474
- 1030474
- https://bugzilla.redhat.com/show_bug.cgi?id=1094299
- https://bugzilla.redhat.com/show_bug.cgi?id=1094299
- https://github.com/torvalds/linux/commit/ef87dbe7614341c2e7bfe8d32fcb7028cc97442c
- https://github.com/torvalds/linux/commit/ef87dbe7614341c2e7bfe8d32fcb7028cc97442c
Modified: 2024-11-21
CVE-2014-1738
The raw_cmd_copyout function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly restrict access to certain pointers during processing of an FDRAWCMD ioctl call, which allows local users to obtain sensitive information from kernel heap memory by leveraging write access to a /dev/fd device.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2145e15e0557a01b9195d1c7199a1b92cb9be81f
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2145e15e0557a01b9195d1c7199a1b92cb9be81f
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- http://linux.oracle.com/errata/ELSA-2014-3043.html
- http://linux.oracle.com/errata/ELSA-2014-3043.html
- SUSE-SU-2014:0667
- SUSE-SU-2014:0667
- SUSE-SU-2014:0683
- SUSE-SU-2014:0683
- RHSA-2014:0800
- RHSA-2014:0800
- RHSA-2014:0801
- RHSA-2014:0801
- 59262
- 59262
- 59309
- 59309
- 59406
- 59406
- 59599
- 59599
- DSA-2926
- DSA-2926
- DSA-2928
- DSA-2928
- [oss-security] 20140509 Linux kernel floppy ioctl kernel code execution
- [oss-security] 20140509 Linux kernel floppy ioctl kernel code execution
- 67302
- 67302
- 1030474
- 1030474
- https://bugzilla.redhat.com/show_bug.cgi?id=1094299
- https://bugzilla.redhat.com/show_bug.cgi?id=1094299
- https://github.com/torvalds/linux/commit/2145e15e0557a01b9195d1c7199a1b92cb9be81f
- https://github.com/torvalds/linux/commit/2145e15e0557a01b9195d1c7199a1b92cb9be81f
Modified: 2024-11-21
CVE-2014-3144
The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=05ab8f2647e4221cbdb3856dd7d32bd5407316b3
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=05ab8f2647e4221cbdb3856dd7d32bd5407316b3
- http://linux.oracle.com/errata/ELSA-2014-3052.html
- http://linux.oracle.com/errata/ELSA-2014-3052.html
- 58990
- 58990
- 59311
- 59311
- 59597
- 59597
- 60613
- 60613
- DSA-2949
- DSA-2949
- [oss-security] 20140509 Re: CVE request Linux kernel: filter: prevent nla extensions to peek beyond the end of the message
- [oss-security] 20140509 Re: CVE request Linux kernel: filter: prevent nla extensions to peek beyond the end of the message
- 67309
- 67309
- USN-2251-1
- USN-2251-1
- USN-2252-1
- USN-2252-1
- USN-2259-1
- USN-2259-1
- USN-2261-1
- USN-2261-1
- USN-2262-1
- USN-2262-1
- USN-2263-1
- USN-2263-1
- USN-2264-1
- USN-2264-1
- https://github.com/torvalds/linux/commit/05ab8f2647e4221cbdb3856dd7d32bd5407316b3
- https://github.com/torvalds/linux/commit/05ab8f2647e4221cbdb3856dd7d32bd5407316b3
Modified: 2024-11-21
CVE-2014-3145
The BPF_S_ANC_NLATTR_NEST extension implementation in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 uses the reverse order in a certain subtraction, which allows local users to cause a denial of service (over-read and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr_nest function before the vulnerability was announced.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=05ab8f2647e4221cbdb3856dd7d32bd5407316b3
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=05ab8f2647e4221cbdb3856dd7d32bd5407316b3
- http://linux.oracle.com/errata/ELSA-2014-3052.html
- http://linux.oracle.com/errata/ELSA-2014-3052.html
- 58990
- 58990
- 59311
- 59311
- 59597
- 59597
- 60613
- 60613
- DSA-2949
- DSA-2949
- [oss-security] 20140509 Re: CVE request Linux kernel: filter: prevent nla extensions to peek beyond the end of the message
- [oss-security] 20140509 Re: CVE request Linux kernel: filter: prevent nla extensions to peek beyond the end of the message
- 67321
- 67321
- 1038201
- 1038201
- USN-2251-1
- USN-2251-1
- USN-2252-1
- USN-2252-1
- USN-2259-1
- USN-2259-1
- USN-2261-1
- USN-2261-1
- USN-2262-1
- USN-2262-1
- USN-2263-1
- USN-2263-1
- USN-2264-1
- USN-2264-1
- https://github.com/torvalds/linux/commit/05ab8f2647e4221cbdb3856dd7d32bd5407316b3
- https://github.com/torvalds/linux/commit/05ab8f2647e4221cbdb3856dd7d32bd5407316b3
- https://source.android.com/security/bulletin/2017-04-01
- https://source.android.com/security/bulletin/2017-04-01