ALT-BU-2014-2777-1
Branch t7 update bulletin.
Package kernel-image-led-ws updated to version 3.4.90-alt0.M70P.1 for branch t7 in task 119834.
Closed vulnerabilities
BDU:2014-00109
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии
BDU:2014-00333
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии
Modified: 2025-04-12
CVE-2014-0196
The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
- http://bugzilla.novell.com/show_bug.cgi?id=875690
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4291086b1f081b869c6d79e5b7441633dc3ace00
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html
- http://pastebin.com/raw.php?i=yTSFUBgZ
- http://rhn.redhat.com/errata/RHSA-2014-0512.html
- http://secunia.com/advisories/59218
- http://secunia.com/advisories/59262
- http://secunia.com/advisories/59599
- http://source.android.com/security/bulletin/2016-07-01.html
- http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15319.html
- http://www.debian.org/security/2014/dsa-2926
- http://www.debian.org/security/2014/dsa-2928
- http://www.exploit-db.com/exploits/33516
- http://www.openwall.com/lists/oss-security/2014/05/05/6
- http://www.osvdb.org/106646
- http://www.ubuntu.com/usn/USN-2196-1
- http://www.ubuntu.com/usn/USN-2197-1
- http://www.ubuntu.com/usn/USN-2198-1
- http://www.ubuntu.com/usn/USN-2199-1
- http://www.ubuntu.com/usn/USN-2200-1
- http://www.ubuntu.com/usn/USN-2201-1
- http://www.ubuntu.com/usn/USN-2202-1
- http://www.ubuntu.com/usn/USN-2203-1
- http://www.ubuntu.com/usn/USN-2204-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1094232
- https://github.com/torvalds/linux/commit/4291086b1f081b869c6d79e5b7441633dc3ace00
- http://bugzilla.novell.com/show_bug.cgi?id=875690
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4291086b1f081b869c6d79e5b7441633dc3ace00
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html
- http://pastebin.com/raw.php?i=yTSFUBgZ
- http://rhn.redhat.com/errata/RHSA-2014-0512.html
- http://secunia.com/advisories/59218
- http://secunia.com/advisories/59262
- http://secunia.com/advisories/59599
- http://source.android.com/security/bulletin/2016-07-01.html
- http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15319.html
- http://www.debian.org/security/2014/dsa-2926
- http://www.debian.org/security/2014/dsa-2928
- http://www.exploit-db.com/exploits/33516
- http://www.openwall.com/lists/oss-security/2014/05/05/6
- http://www.osvdb.org/106646
- http://www.ubuntu.com/usn/USN-2196-1
- http://www.ubuntu.com/usn/USN-2197-1
- http://www.ubuntu.com/usn/USN-2198-1
- http://www.ubuntu.com/usn/USN-2199-1
- http://www.ubuntu.com/usn/USN-2200-1
- http://www.ubuntu.com/usn/USN-2201-1
- http://www.ubuntu.com/usn/USN-2202-1
- http://www.ubuntu.com/usn/USN-2203-1
- http://www.ubuntu.com/usn/USN-2204-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1094232
- https://github.com/torvalds/linux/commit/4291086b1f081b869c6d79e5b7441633dc3ace00
Package kernel-image-un-def updated to version 3.14.4-alt1 for branch t7 in task 119834.
Closed vulnerabilities
BDU:2014-00052
Уязвимость операционной системы Linux, позволяющая злоумышленнику получить доступ к защищаемой информации
BDU:2014-00053
Уязвимость операционной системы Linux, позволяющая злоумышленнику получить доступ к защищаемой информации
BDU:2014-00060
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании
BDU:2014-00062
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании
BDU:2014-00064
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании
BDU:2014-00109
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии
BDU:2014-00110
Уязвимость операционной системы Linux, позволяющая злоумышленнику повысить свои привилегии
BDU:2014-00111
Уязвимость операционной системы Linux, позволяющая злоумышленнику повысить свои привилегии
BDU:2014-00333
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии
BDU:2014-00334
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии
BDU:2014-00335
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии
BDU:2014-00336
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии
BDU:2015-04307
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
BDU:2015-04308
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
BDU:2015-04309
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
BDU:2015-04310
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
Modified: 2025-04-12
CVE-2014-0155
The ioapic_deliver function in virt/kvm/ioapic.c in the Linux kernel through 3.14.1 does not properly validate the kvm_irq_delivery_to_apic return value, which allows guest OS users to cause a denial of service (host OS crash) via a crafted entry in the redirection table of an I/O APIC. NOTE: the affected code was moved to the ioapic_service function before the vulnerability was announced.
- http://git.kernel.org/cgit/virt/kvm/kvm.git/commit/?id=5678de3f15010b9022ee45673f33bcfc71d47b60
- http://www.openwall.com/lists/oss-security/2014/04/07/2
- https://bugzilla.redhat.com/show_bug.cgi?id=1081589
- http://git.kernel.org/cgit/virt/kvm/kvm.git/commit/?id=5678de3f15010b9022ee45673f33bcfc71d47b60
- http://www.openwall.com/lists/oss-security/2014/04/07/2
- https://bugzilla.redhat.com/show_bug.cgi?id=1081589
Modified: 2025-04-12
CVE-2014-0181
The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
- http://marc.info/?l=linux-netdev&m=139828832919748&w=2
- http://rhn.redhat.com/errata/RHSA-2014-1959.html
- http://www.openwall.com/lists/oss-security/2014/04/23/6
- http://www.openwall.com/lists/oss-security/2023/04/16/3
- https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=90f62cf30a78721641e08737bda787552428061e
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.45
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.9
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
- http://marc.info/?l=linux-netdev&m=139828832919748&w=2
- http://rhn.redhat.com/errata/RHSA-2014-1959.html
- http://www.openwall.com/lists/oss-security/2014/04/23/6
- http://www.openwall.com/lists/oss-security/2023/04/16/3
- https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=90f62cf30a78721641e08737bda787552428061e
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.45
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.9
Modified: 2025-04-12
CVE-2014-0196
The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
- http://bugzilla.novell.com/show_bug.cgi?id=875690
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4291086b1f081b869c6d79e5b7441633dc3ace00
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html
- http://pastebin.com/raw.php?i=yTSFUBgZ
- http://rhn.redhat.com/errata/RHSA-2014-0512.html
- http://secunia.com/advisories/59218
- http://secunia.com/advisories/59262
- http://secunia.com/advisories/59599
- http://source.android.com/security/bulletin/2016-07-01.html
- http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15319.html
- http://www.debian.org/security/2014/dsa-2926
- http://www.debian.org/security/2014/dsa-2928
- http://www.exploit-db.com/exploits/33516
- http://www.openwall.com/lists/oss-security/2014/05/05/6
- http://www.osvdb.org/106646
- http://www.ubuntu.com/usn/USN-2196-1
- http://www.ubuntu.com/usn/USN-2197-1
- http://www.ubuntu.com/usn/USN-2198-1
- http://www.ubuntu.com/usn/USN-2199-1
- http://www.ubuntu.com/usn/USN-2200-1
- http://www.ubuntu.com/usn/USN-2201-1
- http://www.ubuntu.com/usn/USN-2202-1
- http://www.ubuntu.com/usn/USN-2203-1
- http://www.ubuntu.com/usn/USN-2204-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1094232
- https://github.com/torvalds/linux/commit/4291086b1f081b869c6d79e5b7441633dc3ace00
- http://bugzilla.novell.com/show_bug.cgi?id=875690
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4291086b1f081b869c6d79e5b7441633dc3ace00
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html
- http://pastebin.com/raw.php?i=yTSFUBgZ
- http://rhn.redhat.com/errata/RHSA-2014-0512.html
- http://secunia.com/advisories/59218
- http://secunia.com/advisories/59262
- http://secunia.com/advisories/59599
- http://source.android.com/security/bulletin/2016-07-01.html
- http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15319.html
- http://www.debian.org/security/2014/dsa-2926
- http://www.debian.org/security/2014/dsa-2928
- http://www.exploit-db.com/exploits/33516
- http://www.openwall.com/lists/oss-security/2014/05/05/6
- http://www.osvdb.org/106646
- http://www.ubuntu.com/usn/USN-2196-1
- http://www.ubuntu.com/usn/USN-2197-1
- http://www.ubuntu.com/usn/USN-2198-1
- http://www.ubuntu.com/usn/USN-2199-1
- http://www.ubuntu.com/usn/USN-2200-1
- http://www.ubuntu.com/usn/USN-2201-1
- http://www.ubuntu.com/usn/USN-2202-1
- http://www.ubuntu.com/usn/USN-2203-1
- http://www.ubuntu.com/usn/USN-2204-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1094232
- https://github.com/torvalds/linux/commit/4291086b1f081b869c6d79e5b7441633dc3ace00
Modified: 2025-04-12
CVE-2014-1737
The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly handle error conditions during processing of an FDRAWCMD ioctl call, which allows local users to trigger kfree operations and gain privileges by leveraging write access to a /dev/fd device.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ef87dbe7614341c2e7bfe8d32fcb7028cc97442c
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- http://linux.oracle.com/errata/ELSA-2014-3043.html
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html
- http://rhn.redhat.com/errata/RHSA-2014-0800.html
- http://rhn.redhat.com/errata/RHSA-2014-0801.html
- http://secunia.com/advisories/59262
- http://secunia.com/advisories/59309
- http://secunia.com/advisories/59406
- http://secunia.com/advisories/59599
- http://www.debian.org/security/2014/dsa-2926
- http://www.debian.org/security/2014/dsa-2928
- http://www.openwall.com/lists/oss-security/2014/05/09/2
- http://www.securityfocus.com/bid/67300
- http://www.securitytracker.com/id/1030474
- https://bugzilla.redhat.com/show_bug.cgi?id=1094299
- https://github.com/torvalds/linux/commit/ef87dbe7614341c2e7bfe8d32fcb7028cc97442c
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ef87dbe7614341c2e7bfe8d32fcb7028cc97442c
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- http://linux.oracle.com/errata/ELSA-2014-3043.html
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html
- http://rhn.redhat.com/errata/RHSA-2014-0800.html
- http://rhn.redhat.com/errata/RHSA-2014-0801.html
- http://secunia.com/advisories/59262
- http://secunia.com/advisories/59309
- http://secunia.com/advisories/59406
- http://secunia.com/advisories/59599
- http://www.debian.org/security/2014/dsa-2926
- http://www.debian.org/security/2014/dsa-2928
- http://www.openwall.com/lists/oss-security/2014/05/09/2
- http://www.securityfocus.com/bid/67300
- http://www.securitytracker.com/id/1030474
- https://bugzilla.redhat.com/show_bug.cgi?id=1094299
- https://github.com/torvalds/linux/commit/ef87dbe7614341c2e7bfe8d32fcb7028cc97442c
Modified: 2025-04-12
CVE-2014-1738
The raw_cmd_copyout function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly restrict access to certain pointers during processing of an FDRAWCMD ioctl call, which allows local users to obtain sensitive information from kernel heap memory by leveraging write access to a /dev/fd device.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2145e15e0557a01b9195d1c7199a1b92cb9be81f
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- http://linux.oracle.com/errata/ELSA-2014-3043.html
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html
- http://rhn.redhat.com/errata/RHSA-2014-0800.html
- http://rhn.redhat.com/errata/RHSA-2014-0801.html
- http://secunia.com/advisories/59262
- http://secunia.com/advisories/59309
- http://secunia.com/advisories/59406
- http://secunia.com/advisories/59599
- http://www.debian.org/security/2014/dsa-2926
- http://www.debian.org/security/2014/dsa-2928
- http://www.openwall.com/lists/oss-security/2014/05/09/2
- http://www.securityfocus.com/bid/67302
- http://www.securitytracker.com/id/1030474
- https://bugzilla.redhat.com/show_bug.cgi?id=1094299
- https://github.com/torvalds/linux/commit/2145e15e0557a01b9195d1c7199a1b92cb9be81f
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2145e15e0557a01b9195d1c7199a1b92cb9be81f
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- http://linux.oracle.com/errata/ELSA-2014-3043.html
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html
- http://rhn.redhat.com/errata/RHSA-2014-0800.html
- http://rhn.redhat.com/errata/RHSA-2014-0801.html
- http://secunia.com/advisories/59262
- http://secunia.com/advisories/59309
- http://secunia.com/advisories/59406
- http://secunia.com/advisories/59599
- http://www.debian.org/security/2014/dsa-2926
- http://www.debian.org/security/2014/dsa-2928
- http://www.openwall.com/lists/oss-security/2014/05/09/2
- http://www.securityfocus.com/bid/67302
- http://www.securitytracker.com/id/1030474
- https://bugzilla.redhat.com/show_bug.cgi?id=1094299
- https://github.com/torvalds/linux/commit/2145e15e0557a01b9195d1c7199a1b92cb9be81f
Modified: 2025-04-12
CVE-2014-2678
The rds_iw_laddr_check function in net/rds/iw.c in the Linux kernel through 3.14 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports.
- http://linux.oracle.com/errata/ELSA-2014-0926-1.html
- http://linux.oracle.com/errata/ELSA-2014-0926.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131276.html
- http://secunia.com/advisories/59386
- http://secunia.com/advisories/60130
- http://secunia.com/advisories/60471
- http://www.openwall.com/lists/oss-security/2014/03/31/10
- http://www.securityfocus.com/bid/66543
- https://lkml.org/lkml/2014/3/29/188
- http://linux.oracle.com/errata/ELSA-2014-0926-1.html
- http://linux.oracle.com/errata/ELSA-2014-0926.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131276.html
- http://secunia.com/advisories/59386
- http://secunia.com/advisories/60130
- http://secunia.com/advisories/60471
- http://www.openwall.com/lists/oss-security/2014/03/31/10
- http://www.securityfocus.com/bid/66543
- https://lkml.org/lkml/2014/3/29/188
Modified: 2025-04-12
CVE-2014-2851
Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.
- http://secunia.com/advisories/59386
- http://secunia.com/advisories/59599
- http://www.debian.org/security/2014/dsa-2926
- http://www.openwall.com/lists/oss-security/2014/04/11/4
- http://www.securityfocus.com/bid/66779
- http://www.securitytracker.com/id/1030769
- https://bugzilla.redhat.com/show_bug.cgi?id=1086730
- https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=b04c46190219a4f845e46a459e3102137b7f6cac
- https://lkml.org/lkml/2014/4/10/736
- http://secunia.com/advisories/59386
- http://secunia.com/advisories/59599
- http://www.debian.org/security/2014/dsa-2926
- http://www.openwall.com/lists/oss-security/2014/04/11/4
- http://www.securityfocus.com/bid/66779
- http://www.securitytracker.com/id/1030769
- https://bugzilla.redhat.com/show_bug.cgi?id=1086730
- https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=b04c46190219a4f845e46a459e3102137b7f6cac
- https://lkml.org/lkml/2014/4/10/736
Modified: 2025-04-12
CVE-2014-3122
The try_to_unmap_cluster function in mm/rmap.c in the Linux kernel before 3.14.3 does not properly consider which pages must be locked, which allows local users to cause a denial of service (system crash) by triggering a memory-usage pattern that requires removal of page-table mappings.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=57e68e9cd65b4b8eb4045a1e0d0746458502554c
- http://secunia.com/advisories/59386
- http://secunia.com/advisories/59599
- http://www.debian.org/security/2014/dsa-2926
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.3
- http://www.openwall.com/lists/oss-security/2014/05/01/7
- http://www.securityfocus.com/bid/67162
- http://www.ubuntu.com/usn/USN-2240-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1093076
- https://github.com/torvalds/linux/commit/57e68e9cd65b4b8eb4045a1e0d0746458502554c
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=57e68e9cd65b4b8eb4045a1e0d0746458502554c
- http://secunia.com/advisories/59386
- http://secunia.com/advisories/59599
- http://www.debian.org/security/2014/dsa-2926
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.3
- http://www.openwall.com/lists/oss-security/2014/05/01/7
- http://www.securityfocus.com/bid/67162
- http://www.ubuntu.com/usn/USN-2240-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1093076
- https://github.com/torvalds/linux/commit/57e68e9cd65b4b8eb4045a1e0d0746458502554c
Modified: 2025-04-12
CVE-2014-3144
The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=05ab8f2647e4221cbdb3856dd7d32bd5407316b3
- http://linux.oracle.com/errata/ELSA-2014-3052.html
- http://secunia.com/advisories/58990
- http://secunia.com/advisories/59311
- http://secunia.com/advisories/59597
- http://secunia.com/advisories/60613
- http://www.debian.org/security/2014/dsa-2949
- http://www.openwall.com/lists/oss-security/2014/05/09/6
- http://www.securityfocus.com/bid/67309
- http://www.ubuntu.com/usn/USN-2251-1
- http://www.ubuntu.com/usn/USN-2252-1
- http://www.ubuntu.com/usn/USN-2259-1
- http://www.ubuntu.com/usn/USN-2261-1
- http://www.ubuntu.com/usn/USN-2262-1
- http://www.ubuntu.com/usn/USN-2263-1
- http://www.ubuntu.com/usn/USN-2264-1
- https://github.com/torvalds/linux/commit/05ab8f2647e4221cbdb3856dd7d32bd5407316b3
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=05ab8f2647e4221cbdb3856dd7d32bd5407316b3
- http://linux.oracle.com/errata/ELSA-2014-3052.html
- http://secunia.com/advisories/58990
- http://secunia.com/advisories/59311
- http://secunia.com/advisories/59597
- http://secunia.com/advisories/60613
- http://www.debian.org/security/2014/dsa-2949
- http://www.openwall.com/lists/oss-security/2014/05/09/6
- http://www.securityfocus.com/bid/67309
- http://www.ubuntu.com/usn/USN-2251-1
- http://www.ubuntu.com/usn/USN-2252-1
- http://www.ubuntu.com/usn/USN-2259-1
- http://www.ubuntu.com/usn/USN-2261-1
- http://www.ubuntu.com/usn/USN-2262-1
- http://www.ubuntu.com/usn/USN-2263-1
- http://www.ubuntu.com/usn/USN-2264-1
- https://github.com/torvalds/linux/commit/05ab8f2647e4221cbdb3856dd7d32bd5407316b3
Modified: 2025-04-12
CVE-2014-3145
The BPF_S_ANC_NLATTR_NEST extension implementation in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 uses the reverse order in a certain subtraction, which allows local users to cause a denial of service (over-read and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr_nest function before the vulnerability was announced.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=05ab8f2647e4221cbdb3856dd7d32bd5407316b3
- http://linux.oracle.com/errata/ELSA-2014-3052.html
- http://secunia.com/advisories/58990
- http://secunia.com/advisories/59311
- http://secunia.com/advisories/59597
- http://secunia.com/advisories/60613
- http://www.debian.org/security/2014/dsa-2949
- http://www.openwall.com/lists/oss-security/2014/05/09/6
- http://www.securityfocus.com/bid/67321
- http://www.securitytracker.com/id/1038201
- http://www.ubuntu.com/usn/USN-2251-1
- http://www.ubuntu.com/usn/USN-2252-1
- http://www.ubuntu.com/usn/USN-2259-1
- http://www.ubuntu.com/usn/USN-2261-1
- http://www.ubuntu.com/usn/USN-2262-1
- http://www.ubuntu.com/usn/USN-2263-1
- http://www.ubuntu.com/usn/USN-2264-1
- https://github.com/torvalds/linux/commit/05ab8f2647e4221cbdb3856dd7d32bd5407316b3
- https://source.android.com/security/bulletin/2017-04-01
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=05ab8f2647e4221cbdb3856dd7d32bd5407316b3
- http://linux.oracle.com/errata/ELSA-2014-3052.html
- http://secunia.com/advisories/58990
- http://secunia.com/advisories/59311
- http://secunia.com/advisories/59597
- http://secunia.com/advisories/60613
- http://www.debian.org/security/2014/dsa-2949
- http://www.openwall.com/lists/oss-security/2014/05/09/6
- http://www.securityfocus.com/bid/67321
- http://www.securitytracker.com/id/1038201
- http://www.ubuntu.com/usn/USN-2251-1
- http://www.ubuntu.com/usn/USN-2252-1
- http://www.ubuntu.com/usn/USN-2259-1
- http://www.ubuntu.com/usn/USN-2261-1
- http://www.ubuntu.com/usn/USN-2262-1
- http://www.ubuntu.com/usn/USN-2263-1
- http://www.ubuntu.com/usn/USN-2264-1
- https://github.com/torvalds/linux/commit/05ab8f2647e4221cbdb3856dd7d32bd5407316b3
- https://source.android.com/security/bulletin/2017-04-01
Modified: 2025-04-12
CVE-2014-4027
The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc
- http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html
- http://permalink.gmane.org/gmane.linux.scsi.target.devel/6618
- http://secunia.com/advisories/59134
- http://secunia.com/advisories/59777
- http://secunia.com/advisories/60564
- http://secunia.com/advisories/61310
- http://www.openwall.com/lists/oss-security/2014/06/11/1
- http://www.ubuntu.com/usn/USN-2334-1
- http://www.ubuntu.com/usn/USN-2335-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1108744
- https://github.com/torvalds/linux/commit/4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc
- https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15685.html
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc
- http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html
- http://permalink.gmane.org/gmane.linux.scsi.target.devel/6618
- http://secunia.com/advisories/59134
- http://secunia.com/advisories/59777
- http://secunia.com/advisories/60564
- http://secunia.com/advisories/61310
- http://www.openwall.com/lists/oss-security/2014/06/11/1
- http://www.ubuntu.com/usn/USN-2334-1
- http://www.ubuntu.com/usn/USN-2335-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1108744
- https://github.com/torvalds/linux/commit/4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc
- https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15685.html
Modified: 2025-04-12
CVE-2014-7283
The xfs_da3_fixhashpath function in fs/xfs/xfs_da_btree.c in the xfs implementation in the Linux kernel before 3.14.2 does not properly compare btree hash values, which allows local users to cause a denial of service (filesystem corruption, and OOPS or panic) via operations on directories that have hash collisions, as demonstrated by rmdir operations.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c88547a8119e3b581318ab65e9b72f27f23e641d
- http://marc.info/?l=linux-xfs&m=139590613002926&w=2
- http://rhn.redhat.com/errata/RHSA-2014-1943.html
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.2
- http://www.openwall.com/lists/oss-security/2014/10/01/29
- http://www.securityfocus.com/bid/70261
- https://bugzilla.redhat.com/show_bug.cgi?id=1148777
- https://github.com/torvalds/linux/commit/c88547a8119e3b581318ab65e9b72f27f23e641d
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c88547a8119e3b581318ab65e9b72f27f23e641d
- http://marc.info/?l=linux-xfs&m=139590613002926&w=2
- http://rhn.redhat.com/errata/RHSA-2014-1943.html
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.2
- http://www.openwall.com/lists/oss-security/2014/10/01/29
- http://www.securityfocus.com/bid/70261
- https://bugzilla.redhat.com/show_bug.cgi?id=1148777
- https://github.com/torvalds/linux/commit/c88547a8119e3b581318ab65e9b72f27f23e641d
Package kernel-src-kvm updated to version 3.10.21-alt8 for branch t7 in task 119834.
Closed vulnerabilities
BDU:2015-04307
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
BDU:2015-04308
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
BDU:2015-04309
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
BDU:2015-04310
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
Modified: 2025-04-12
CVE-2014-0155
The ioapic_deliver function in virt/kvm/ioapic.c in the Linux kernel through 3.14.1 does not properly validate the kvm_irq_delivery_to_apic return value, which allows guest OS users to cause a denial of service (host OS crash) via a crafted entry in the redirection table of an I/O APIC. NOTE: the affected code was moved to the ioapic_service function before the vulnerability was announced.
- http://git.kernel.org/cgit/virt/kvm/kvm.git/commit/?id=5678de3f15010b9022ee45673f33bcfc71d47b60
- http://www.openwall.com/lists/oss-security/2014/04/07/2
- https://bugzilla.redhat.com/show_bug.cgi?id=1081589
- http://git.kernel.org/cgit/virt/kvm/kvm.git/commit/?id=5678de3f15010b9022ee45673f33bcfc71d47b60
- http://www.openwall.com/lists/oss-security/2014/04/07/2
- https://bugzilla.redhat.com/show_bug.cgi?id=1081589