ALT-BU-2014-2992-1
Branch sisyphus update bulletin.
Package kernel-image-un-def updated to version 3.16.3-alt1 for branch sisyphus in task 130598.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2014-3631
The assoc_array_gc function in the associative-array implementation in lib/assoc_array.c in the Linux kernel before 3.16.3 does not properly implement garbage collection, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via multiple "keyctl newring" operations followed by a "keyctl timeout" operation.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=95389b08d93d5c06ec63ab49bd732b0069b7c35e
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=95389b08d93d5c06ec63ab49bd732b0069b7c35e
- 111298
- 111298
- 36268
- 36268
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- 70095
- 70095
- USN-2378-1
- USN-2378-1
- USN-2379-1
- USN-2379-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1140325
- https://bugzilla.redhat.com/show_bug.cgi?id=1140325
- https://github.com/torvalds/linux/commit/95389b08d93d5c06ec63ab49bd732b0069b7c35e
- https://github.com/torvalds/linux/commit/95389b08d93d5c06ec63ab49bd732b0069b7c35e
Modified: 2024-11-21
CVE-2014-6416
Buffer overflow in net/ceph/auth_x.c in Ceph, as used in the Linux kernel before 3.16.3, allows remote attackers to cause a denial of service (memory corruption and panic) or possibly have unspecified other impact via a long unencrypted auth ticket.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8
- http://tracker.ceph.com/issues/8979
- http://tracker.ceph.com/issues/8979
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- [oss-security] 20140915 Re: CVE Request: libceph auth token overflow / Linux kernel
- [oss-security] 20140915 Re: CVE Request: libceph auth token overflow / Linux kernel
- 69805
- 69805
- USN-2376-1
- USN-2376-1
- USN-2377-1
- USN-2377-1
- USN-2378-1
- USN-2378-1
- USN-2379-1
- USN-2379-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1142060
- https://bugzilla.redhat.com/show_bug.cgi?id=1142060
- https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8
- https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8
Modified: 2024-11-21
CVE-2014-6417
net/ceph/auth_x.c in Ceph, as used in the Linux kernel before 3.16.3, does not properly consider the possibility of kmalloc failure, which allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via a long unencrypted auth ticket.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8
- http://tracker.ceph.com/issues/8979
- http://tracker.ceph.com/issues/8979
- http://tracker.ceph.com/issues/9560
- http://tracker.ceph.com/issues/9560
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- [oss-security] 20140915 Re: CVE Request: libceph auth token overflow / Linux kernel
- [oss-security] 20140915 Re: CVE Request: libceph auth token overflow / Linux kernel
- USN-2376-1
- USN-2376-1
- USN-2377-1
- USN-2377-1
- USN-2378-1
- USN-2378-1
- USN-2379-1
- USN-2379-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1142072
- https://bugzilla.redhat.com/show_bug.cgi?id=1142072
- https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8
- https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8
Modified: 2024-11-21
CVE-2014-6418
net/ceph/auth_x.c in Ceph, as used in the Linux kernel before 3.16.3, does not properly validate auth replies, which allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via crafted data from the IP address of a Ceph Monitor.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8
- http://tracker.ceph.com/issues/8979
- http://tracker.ceph.com/issues/8979
- http://tracker.ceph.com/issues/9561
- http://tracker.ceph.com/issues/9561
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- [oss-security] 20140915 Re: CVE Request: libceph auth token overflow / Linux kernel
- [oss-security] 20140915 Re: CVE Request: libceph auth token overflow / Linux kernel
- USN-2376-1
- USN-2376-1
- USN-2377-1
- USN-2377-1
- USN-2378-1
- USN-2378-1
- USN-2379-1
- USN-2379-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1142073
- https://bugzilla.redhat.com/show_bug.cgi?id=1142073
- https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8
- https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8
Modified: 2024-11-21
CVE-2014-7145
The SMB2_tcon function in fs/cifs/smb2pdu.c in the Linux kernel before 3.16.3 allows remote CIFS servers to cause a denial of service (NULL pointer dereference and client system crash) or possibly have unspecified other impact by deleting the IPC$ share during resolution of DFS referrals.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=18f39e7be0121317550d03e267e3ebd4dbfbb3ce
- RHSA-2015:0102
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- [oss-security] 20140922 Re: CVE request: [CIFS] Possible null ptr deref in SMB2_tcon / Linux kernel
- 69867
- USN-2394-1
- https://github.com/torvalds/linux/commit/18f39e7be0121317550d03e267e3ebd4dbfbb3ce
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=18f39e7be0121317550d03e267e3ebd4dbfbb3ce
- https://github.com/torvalds/linux/commit/18f39e7be0121317550d03e267e3ebd4dbfbb3ce
- USN-2394-1
- 69867
- [oss-security] 20140922 Re: CVE request: [CIFS] Possible null ptr deref in SMB2_tcon / Linux kernel
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- RHSA-2015:0102
Package kernel-image-std-def updated to version 3.14.19-alt1 for branch sisyphus in task 130592.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2014-6416
Buffer overflow in net/ceph/auth_x.c in Ceph, as used in the Linux kernel before 3.16.3, allows remote attackers to cause a denial of service (memory corruption and panic) or possibly have unspecified other impact via a long unencrypted auth ticket.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8
- http://tracker.ceph.com/issues/8979
- http://tracker.ceph.com/issues/8979
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- [oss-security] 20140915 Re: CVE Request: libceph auth token overflow / Linux kernel
- [oss-security] 20140915 Re: CVE Request: libceph auth token overflow / Linux kernel
- 69805
- 69805
- USN-2376-1
- USN-2376-1
- USN-2377-1
- USN-2377-1
- USN-2378-1
- USN-2378-1
- USN-2379-1
- USN-2379-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1142060
- https://bugzilla.redhat.com/show_bug.cgi?id=1142060
- https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8
- https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8
Modified: 2024-11-21
CVE-2014-6417
net/ceph/auth_x.c in Ceph, as used in the Linux kernel before 3.16.3, does not properly consider the possibility of kmalloc failure, which allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via a long unencrypted auth ticket.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8
- http://tracker.ceph.com/issues/8979
- http://tracker.ceph.com/issues/8979
- http://tracker.ceph.com/issues/9560
- http://tracker.ceph.com/issues/9560
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- [oss-security] 20140915 Re: CVE Request: libceph auth token overflow / Linux kernel
- [oss-security] 20140915 Re: CVE Request: libceph auth token overflow / Linux kernel
- USN-2376-1
- USN-2376-1
- USN-2377-1
- USN-2377-1
- USN-2378-1
- USN-2378-1
- USN-2379-1
- USN-2379-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1142072
- https://bugzilla.redhat.com/show_bug.cgi?id=1142072
- https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8
- https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8
Modified: 2024-11-21
CVE-2014-6418
net/ceph/auth_x.c in Ceph, as used in the Linux kernel before 3.16.3, does not properly validate auth replies, which allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via crafted data from the IP address of a Ceph Monitor.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8
- http://tracker.ceph.com/issues/8979
- http://tracker.ceph.com/issues/8979
- http://tracker.ceph.com/issues/9561
- http://tracker.ceph.com/issues/9561
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- [oss-security] 20140915 Re: CVE Request: libceph auth token overflow / Linux kernel
- [oss-security] 20140915 Re: CVE Request: libceph auth token overflow / Linux kernel
- USN-2376-1
- USN-2376-1
- USN-2377-1
- USN-2377-1
- USN-2378-1
- USN-2378-1
- USN-2379-1
- USN-2379-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1142073
- https://bugzilla.redhat.com/show_bug.cgi?id=1142073
- https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8
- https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8
Modified: 2024-11-21
CVE-2014-7145
The SMB2_tcon function in fs/cifs/smb2pdu.c in the Linux kernel before 3.16.3 allows remote CIFS servers to cause a denial of service (NULL pointer dereference and client system crash) or possibly have unspecified other impact by deleting the IPC$ share during resolution of DFS referrals.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=18f39e7be0121317550d03e267e3ebd4dbfbb3ce
- RHSA-2015:0102
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- [oss-security] 20140922 Re: CVE request: [CIFS] Possible null ptr deref in SMB2_tcon / Linux kernel
- 69867
- USN-2394-1
- https://github.com/torvalds/linux/commit/18f39e7be0121317550d03e267e3ebd4dbfbb3ce
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=18f39e7be0121317550d03e267e3ebd4dbfbb3ce
- https://github.com/torvalds/linux/commit/18f39e7be0121317550d03e267e3ebd4dbfbb3ce
- USN-2394-1
- 69867
- [oss-security] 20140922 Re: CVE request: [CIFS] Possible null ptr deref in SMB2_tcon / Linux kernel
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- RHSA-2015:0102
Closed vulnerabilities
BDU:2015-03389
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2024-11-21
CVE-2009-3305
Polipo 1.0.4, and possibly other versions, allows remote attackers to cause a denial of service (crash) via a request with a Cache-Control header that lacks a value for the max-age field, which triggers a segmentation fault in the httpParseHeaders function in http_parse.c, and possibly other unspecified vectors.
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=547047
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=547047
- http://groups.google.com/group/linux.debian.bugs.dist/browse_thread/thread/dca6877a8117f0df
- http://groups.google.com/group/linux.debian.bugs.dist/browse_thread/thread/dca6877a8117f0df
- 37607
- 37607
- 38647
- 38647
- DSA-2002
- DSA-2002
- 37463
- 37463
Modified: 2024-11-21
CVE-2009-4413
The httpClientDiscardBody function in client.c in Polipo 0.9.8, 0.9.12, 1.0.4, and possibly other versions, allows remote attackers to cause a denial of service (crash) via a request with a large Content-Length value, which triggers an integer overflow, a signed-to-unsigned conversion error with a negative value, and a segmentation fault.
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560779
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560779
- 37607
- 37607
- 38647
- 38647
- DSA-2002
- DSA-2002
- 10338
- 10338
- [oss-security] 20091212 CVE request: polipo DoS via overly large "Content-Length" header
- [oss-security] 20091212 CVE request: polipo DoS via overly large "Content-Length" header
- 37463
- 37463
Modified: 2024-11-21
CVE-2011-3596
Polipo before 1.0.4.1 suffers from a DoD vulnerability via specially-crafted HTTP POST / PUT request.
- https://access.redhat.com/security/cve/cve-2011-3596
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=644289
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3596
- https://security-tracker.debian.org/tracker/CVE-2011-3596
- https://access.redhat.com/security/cve/cve-2011-3596
- https://security-tracker.debian.org/tracker/CVE-2011-3596
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3596
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=644289
Closed vulnerabilities
BDU:2015-00193
Уязвимость браузера Google Chrome, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-00201
Уязвимости браузера Google Chrome, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2014-3178
Use-after-free vulnerability in core/dom/Node.cpp in Blink, as used in Google Chrome before 37.0.2062.120, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of render-tree inconsistencies.
- http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_9.html
- http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_9.html
- 61446
- 61446
- GLSA-201409-06
- GLSA-201409-06
- DSA-3039
- DSA-3039
- 69709
- 69709
- https://crbug.com/401362
- https://crbug.com/401362
- google-chrome-cve20143178-code-exec(95815)
- google-chrome-cve20143178-code-exec(95815)
- https://src.chromium.org/viewvc/blink?revision=180539&view=revision
- https://src.chromium.org/viewvc/blink?revision=180539&view=revision
Modified: 2024-11-21
CVE-2014-3179
Multiple unspecified vulnerabilities in Google Chrome before 37.0.2062.120 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
- http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_9.html
- http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_9.html
- 61446
- 61446
- GLSA-201409-06
- GLSA-201409-06
- DSA-3039
- DSA-3039
- 69710
- 69710
- https://code.google.com/p/chromium/issues/detail?id=396447
- https://code.google.com/p/chromium/issues/detail?id=396447
- https://code.google.com/p/chromium/issues/detail?id=402255
- https://code.google.com/p/chromium/issues/detail?id=402255
- https://code.google.com/p/chromium/issues/detail?id=403596
- https://code.google.com/p/chromium/issues/detail?id=403596
- https://crbug.com/411014
- https://crbug.com/411014
- google-chrome-cve20143179-unspec(95816)
- google-chrome-cve20143179-unspec(95816)