ALT-BU-2014-2806-1
Branch p7 update bulletin.
Package kernel-image-un-def updated to version 3.14.5-alt1 for branch p7 in task 120751.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2014-7284
The net_get_random_once implementation in net/core/utils.c in the Linux kernel 3.13.x and 3.14.x before 3.14.5 on certain Intel processors does not perform the intended slow-path operation to initialize random seeds, which makes it easier for remote attackers to spoof or disrupt IP communication by leveraging the predictability of TCP sequence numbers, TCP and UDP port numbers, and IP ID values.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3d4405226d27b3a215e4d03cfa51f536244e5de7
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.5
- http://www.openwall.com/lists/oss-security/2014/10/01/19
- https://bugzilla.redhat.com/show_bug.cgi?id=1148788
- https://github.com/torvalds/linux/commit/3d4405226d27b3a215e4d03cfa51f536244e5de7
- https://web.archive.org/web/20141002163852/http://secondlookforensics.com/ngro-linux-kernel-bug/
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3d4405226d27b3a215e4d03cfa51f536244e5de7
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.5
- http://www.openwall.com/lists/oss-security/2014/10/01/19
- https://bugzilla.redhat.com/show_bug.cgi?id=1148788
- https://github.com/torvalds/linux/commit/3d4405226d27b3a215e4d03cfa51f536244e5de7
- https://web.archive.org/web/20141002163852/http://secondlookforensics.com/ngro-linux-kernel-bug/
Modified: 2025-04-12
CVE-2014-9715
include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that triggers extension loading, as demonstrated by configuring a PPTP tunnel in a NAT environment.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=223b02d923ecd7c84cf9780bb3686f455d279279
- http://marc.info/?l=netfilter-devel&m=140112364215200&w=2
- http://rhn.redhat.com/errata/RHSA-2015-1534.html
- http://rhn.redhat.com/errata/RHSA-2015-1564.html
- http://www.debian.org/security/2015/dsa-3237
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.5
- http://www.openwall.com/lists/oss-security/2015/04/08/1
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/73953
- http://www.securitytracker.com/id/1032415
- https://bugzilla.redhat.com/show_bug.cgi?id=1208684
- https://github.com/torvalds/linux/commit/223b02d923ecd7c84cf9780bb3686f455d279279
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=223b02d923ecd7c84cf9780bb3686f455d279279
- http://marc.info/?l=netfilter-devel&m=140112364215200&w=2
- http://rhn.redhat.com/errata/RHSA-2015-1534.html
- http://rhn.redhat.com/errata/RHSA-2015-1564.html
- http://www.debian.org/security/2015/dsa-3237
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.5
- http://www.openwall.com/lists/oss-security/2015/04/08/1
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/73953
- http://www.securitytracker.com/id/1032415
- https://bugzilla.redhat.com/show_bug.cgi?id=1208684
- https://github.com/torvalds/linux/commit/223b02d923ecd7c84cf9780bb3686f455d279279
Closed vulnerabilities
BDU:2015-00683
Уязвимость программного обеспечения SendMail SMTP Server, позволяющая злоумышленнику нарушить конфиденциальность защищаемой информации
Modified: 2025-04-12
CVE-2014-3956
The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has arguments in the wrong order, and consequently skips setting expected FD_CLOEXEC flags, which allows local users to access unintended high-numbered file descriptors via a custom mail-delivery program.
- ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES
- http://advisories.mageia.org/MGASA-2014-0270.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134349.html
- http://lists.opensuse.org/opensuse-updates/2014-06/msg00032.html
- http://lists.opensuse.org/opensuse-updates/2014-06/msg00033.html
- http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html
- http://secunia.com/advisories/57455
- http://secunia.com/advisories/58628
- http://security.gentoo.org/glsa/glsa-201412-32.xml
- http://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A11.sendmail.asc
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:147
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:128
- http://www.securityfocus.com/bid/67791
- http://www.securitytracker.com/id/1030331
- http://www.sendmail.com/sm/open_source/download/8.14.9/
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.728644
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05216368
- ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES
- http://advisories.mageia.org/MGASA-2014-0270.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134349.html
- http://lists.opensuse.org/opensuse-updates/2014-06/msg00032.html
- http://lists.opensuse.org/opensuse-updates/2014-06/msg00033.html
- http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html
- http://secunia.com/advisories/57455
- http://secunia.com/advisories/58628
- http://security.gentoo.org/glsa/glsa-201412-32.xml
- http://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A11.sendmail.asc
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:147
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:128
- http://www.securityfocus.com/bid/67791
- http://www.securitytracker.com/id/1030331
- http://www.sendmail.com/sm/open_source/download/8.14.9/
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.728644
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05216368