ALT-BU-2014-2997-1
Branch p7 update bulletin.
Package kernel-image-std-def updated to version 3.14.19-alt1 for branch p7 in task 130691.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2014-6416
Buffer overflow in net/ceph/auth_x.c in Ceph, as used in the Linux kernel before 3.16.3, allows remote attackers to cause a denial of service (memory corruption and panic) or possibly have unspecified other impact via a long unencrypted auth ticket.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8
- http://tracker.ceph.com/issues/8979
- http://tracker.ceph.com/issues/8979
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- [oss-security] 20140915 Re: CVE Request: libceph auth token overflow / Linux kernel
- [oss-security] 20140915 Re: CVE Request: libceph auth token overflow / Linux kernel
- 69805
- 69805
- USN-2376-1
- USN-2376-1
- USN-2377-1
- USN-2377-1
- USN-2378-1
- USN-2378-1
- USN-2379-1
- USN-2379-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1142060
- https://bugzilla.redhat.com/show_bug.cgi?id=1142060
- https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8
- https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8
Modified: 2024-11-21
CVE-2014-6417
net/ceph/auth_x.c in Ceph, as used in the Linux kernel before 3.16.3, does not properly consider the possibility of kmalloc failure, which allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via a long unencrypted auth ticket.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8
- http://tracker.ceph.com/issues/8979
- http://tracker.ceph.com/issues/8979
- http://tracker.ceph.com/issues/9560
- http://tracker.ceph.com/issues/9560
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- [oss-security] 20140915 Re: CVE Request: libceph auth token overflow / Linux kernel
- [oss-security] 20140915 Re: CVE Request: libceph auth token overflow / Linux kernel
- USN-2376-1
- USN-2376-1
- USN-2377-1
- USN-2377-1
- USN-2378-1
- USN-2378-1
- USN-2379-1
- USN-2379-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1142072
- https://bugzilla.redhat.com/show_bug.cgi?id=1142072
- https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8
- https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8
Modified: 2024-11-21
CVE-2014-6418
net/ceph/auth_x.c in Ceph, as used in the Linux kernel before 3.16.3, does not properly validate auth replies, which allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via crafted data from the IP address of a Ceph Monitor.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8
- http://tracker.ceph.com/issues/8979
- http://tracker.ceph.com/issues/8979
- http://tracker.ceph.com/issues/9561
- http://tracker.ceph.com/issues/9561
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- [oss-security] 20140915 Re: CVE Request: libceph auth token overflow / Linux kernel
- [oss-security] 20140915 Re: CVE Request: libceph auth token overflow / Linux kernel
- USN-2376-1
- USN-2376-1
- USN-2377-1
- USN-2377-1
- USN-2378-1
- USN-2378-1
- USN-2379-1
- USN-2379-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1142073
- https://bugzilla.redhat.com/show_bug.cgi?id=1142073
- https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8
- https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8
Modified: 2024-11-21
CVE-2014-7145
The SMB2_tcon function in fs/cifs/smb2pdu.c in the Linux kernel before 3.16.3 allows remote CIFS servers to cause a denial of service (NULL pointer dereference and client system crash) or possibly have unspecified other impact by deleting the IPC$ share during resolution of DFS referrals.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=18f39e7be0121317550d03e267e3ebd4dbfbb3ce
- RHSA-2015:0102
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- [oss-security] 20140922 Re: CVE request: [CIFS] Possible null ptr deref in SMB2_tcon / Linux kernel
- 69867
- USN-2394-1
- https://github.com/torvalds/linux/commit/18f39e7be0121317550d03e267e3ebd4dbfbb3ce
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=18f39e7be0121317550d03e267e3ebd4dbfbb3ce
- https://github.com/torvalds/linux/commit/18f39e7be0121317550d03e267e3ebd4dbfbb3ce
- USN-2394-1
- 69867
- [oss-security] 20140922 Re: CVE request: [CIFS] Possible null ptr deref in SMB2_tcon / Linux kernel
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- RHSA-2015:0102
Package kernel-image-std-pae updated to version 3.14.19-alt1 for branch p7 in task 130691.
Closed vulnerabilities
BDU:2014-00063
Уязвимость ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании
BDU:2015-04307
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
BDU:2015-04308
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
BDU:2015-04309
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
BDU:2015-04310
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
BDU:2015-05900
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05901
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05902
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05903
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05904
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05905
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05906
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05907
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05908
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05909
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05910
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05911
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05912
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05913
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05914
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05915
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05916
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05917
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05918
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05919
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05920
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05921
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05922
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2014-2523
net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b22f5126a24b3b2f15448c3f2a254fc10cbc2b92
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b22f5126a24b3b2f15448c3f2a254fc10cbc2b92
- 57446
- 57446
- http://twitter.com/grsecurity/statuses/445496197399461888
- http://twitter.com/grsecurity/statuses/445496197399461888
- [oss-security] 20140317 Re: CVE Request: netfilter: remote memory corruption in nf_conntrack_proto_dccp.c
- [oss-security] 20140317 Re: CVE Request: netfilter: remote memory corruption in nf_conntrack_proto_dccp.c
- 66279
- 66279
- 1029945
- 1029945
- USN-2173-1
- USN-2173-1
- USN-2174-1
- USN-2174-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1077343
- https://bugzilla.redhat.com/show_bug.cgi?id=1077343
- linux-kernel-cve20142523-code-exec(91910)
- linux-kernel-cve20142523-code-exec(91910)
- https://github.com/torvalds/linux/commit/b22f5126a24b3b2f15448c3f2a254fc10cbc2b92
- https://github.com/torvalds/linux/commit/b22f5126a24b3b2f15448c3f2a254fc10cbc2b92
Modified: 2024-11-21
CVE-2014-3153
The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e9c243a5a6de0be8e584c604d353412584b592f8
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e9c243a5a6de0be8e584c604d353412584b592f8
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- http://linux.oracle.com/errata/ELSA-2014-3037.html
- http://linux.oracle.com/errata/ELSA-2014-3037.html
- http://linux.oracle.com/errata/ELSA-2014-3038.html
- http://linux.oracle.com/errata/ELSA-2014-3038.html
- http://linux.oracle.com/errata/ELSA-2014-3039.html
- http://linux.oracle.com/errata/ELSA-2014-3039.html
- SUSE-SU-2014:0775
- SUSE-SU-2014:0775
- SUSE-SU-2014:0796
- SUSE-SU-2014:0796
- SUSE-SU-2014:0837
- SUSE-SU-2014:0837
- openSUSE-SU-2014:0878
- openSUSE-SU-2014:0878
- SUSE-SU-2014:1316
- SUSE-SU-2014:1316
- SUSE-SU-2014:1319
- SUSE-SU-2014:1319
- [oss-security] 20140605 Re: Linux kernel futex local privilege escalation (CVE-2014-3153)
- [oss-security] 20140605 Re: Linux kernel futex local privilege escalation (CVE-2014-3153)
- [oss-security] 20140606 Re: Linux kernel futex local privilege escalation (CVE-2014-3153)
- [oss-security] 20140606 Re: Linux kernel futex local privilege escalation (CVE-2014-3153)
- RHSA-2014:0800
- RHSA-2014:0800
- 58500
- 58500
- 58990
- 58990
- 59029
- 59029
- 59092
- 59092
- 59153
- 59153
- 59262
- 59262
- 59309
- 59309
- 59386
- 59386
- 59599
- 59599
- DSA-2949
- DSA-2949
- 35370
- 35370
- [oss-security] 20140605 Linux kernel futex local privilege escalation (CVE-2014-3153)
- [oss-security] 20140605 Linux kernel futex local privilege escalation (CVE-2014-3153)
- [oss-security] 20210201 Re: Linux Kernel: local priv escalation via futexes
- [oss-security] 20210201 Re: Linux Kernel: local priv escalation via futexes
- 67906
- 67906
- 1030451
- 1030451
- USN-2237-1
- USN-2237-1
- USN-2240-1
- USN-2240-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1103626
- https://bugzilla.redhat.com/show_bug.cgi?id=1103626
- https://elongl.github.io/exploitation/2021/01/08/cve-2014-3153.html
- https://elongl.github.io/exploitation/2021/01/08/cve-2014-3153.html
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=13fbca4c6ecd96ec1a1cfa2e4f2ce191fe928a5e
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=13fbca4c6ecd96ec1a1cfa2e4f2ce191fe928a5e
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=54a217887a7b658e2650c3feff22756ab80c7339
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=54a217887a7b658e2650c3feff22756ab80c7339
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b3eaa9fc5cd0a4d74b18f6b8dc617aeaf1873270
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b3eaa9fc5cd0a4d74b18f6b8dc617aeaf1873270
- https://github.com/elongl/CVE-2014-3153
- https://github.com/elongl/CVE-2014-3153
- https://github.com/torvalds/linux/commit/e9c243a5a6de0be8e584c604d353412584b592f8
- https://github.com/torvalds/linux/commit/e9c243a5a6de0be8e584c604d353412584b592f8
- https://www.openwall.com/lists/oss-security/2021/02/01/4
- https://www.openwall.com/lists/oss-security/2021/02/01/4
Package kernel-image-un-def updated to version 3.16.3-alt1 for branch p7 in task 130691.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2014-3182
Array index error in the logi_dj_raw_event function in drivers/hid/hid-logitech-dj.c in the Linux kernel before 3.16.2 allows physically proximate attackers to execute arbitrary code or cause a denial of service (invalid kfree) via a crafted device that provides a malformed REPORT_TYPE_NOTIF_DEVICE_UNPAIRED value.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ad3e14d7c5268c2e24477c6ef54bbdf88add5d36
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ad3e14d7c5268c2e24477c6ef54bbdf88add5d36
- RHSA-2014:1318
- RHSA-2014:1318
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.2
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.2
- [oss-security] 20140911 Multiple Linux USB driver CVE assignment
- [oss-security] 20140911 Multiple Linux USB driver CVE assignment
- 69770
- 69770
- https://bugzilla.redhat.com/show_bug.cgi?id=1141210
- https://bugzilla.redhat.com/show_bug.cgi?id=1141210
- https://code.google.com/p/google-security-research/issues/detail?id=89
- https://code.google.com/p/google-security-research/issues/detail?id=89
- https://github.com/torvalds/linux/commit/ad3e14d7c5268c2e24477c6ef54bbdf88add5d36
- https://github.com/torvalds/linux/commit/ad3e14d7c5268c2e24477c6ef54bbdf88add5d36
Modified: 2024-11-21
CVE-2014-3183
Heap-based buffer overflow in the logi_dj_ll_raw_request function in drivers/hid/hid-logitech-dj.c in the Linux kernel before 3.16.2 allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted device that specifies a large report size for an LED report.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=51217e69697fba92a06e07e16f55c9a52d8e8945
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=51217e69697fba92a06e07e16f55c9a52d8e8945
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.2
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.2
- [oss-security] 20140911 Multiple Linux USB driver CVE assignment
- [oss-security] 20140911 Multiple Linux USB driver CVE assignment
- https://bugzilla.redhat.com/show_bug.cgi?id=1141344
- https://bugzilla.redhat.com/show_bug.cgi?id=1141344
- https://code.google.com/p/google-security-research/issues/detail?id=90
- https://code.google.com/p/google-security-research/issues/detail?id=90
- https://github.com/torvalds/linux/commit/51217e69697fba92a06e07e16f55c9a52d8e8945
- https://github.com/torvalds/linux/commit/51217e69697fba92a06e07e16f55c9a52d8e8945
Modified: 2024-11-21
CVE-2014-3184
The report_fixup functions in the HID subsystem in the Linux kernel before 3.16.2 might allow physically proximate attackers to cause a denial of service (out-of-bounds write) via a crafted device that provides a small report descriptor, related to (1) drivers/hid/hid-cherry.c, (2) drivers/hid/hid-kye.c, (3) drivers/hid/hid-lg.c, (4) drivers/hid/hid-monterey.c, (5) drivers/hid/hid-petalynx.c, and (6) drivers/hid/hid-sunplus.c.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4ab25786c87eb20857bbb715c3ae34ec8fd6a214
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4ab25786c87eb20857bbb715c3ae34ec8fd6a214
- SUSE-SU-2015:0481
- SUSE-SU-2015:0481
- openSUSE-SU-2015:0566
- openSUSE-SU-2015:0566
- SUSE-SU-2015:0652
- SUSE-SU-2015:0652
- SUSE-SU-2015:0812
- SUSE-SU-2015:0812
- RHSA-2014:1318
- RHSA-2014:1318
- RHSA-2015:1272
- RHSA-2015:1272
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.2
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.2
- [oss-security] 20140911 Multiple Linux USB driver CVE assignment
- [oss-security] 20140911 Multiple Linux USB driver CVE assignment
- 69768
- 69768
- USN-2374-1
- USN-2374-1
- USN-2375-1
- USN-2375-1
- USN-2376-1
- USN-2376-1
- USN-2377-1
- USN-2377-1
- USN-2378-1
- USN-2378-1
- USN-2379-1
- USN-2379-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1141391
- https://bugzilla.redhat.com/show_bug.cgi?id=1141391
- https://code.google.com/p/google-security-research/issues/detail?id=91
- https://code.google.com/p/google-security-research/issues/detail?id=91
- https://github.com/torvalds/linux/commit/4ab25786c87eb20857bbb715c3ae34ec8fd6a214
- https://github.com/torvalds/linux/commit/4ab25786c87eb20857bbb715c3ae34ec8fd6a214
Modified: 2024-11-21
CVE-2014-3185
Multiple buffer overflows in the command_port_read_callback function in drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver in the Linux kernel before 3.16.2 allow physically proximate attackers to execute arbitrary code or cause a denial of service (memory corruption and system crash) via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with a bulk response.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6817ae225cd650fb1c3295d769298c38b1eba818
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6817ae225cd650fb1c3295d769298c38b1eba818
- SUSE-SU-2015:0481
- SUSE-SU-2015:0481
- openSUSE-SU-2015:0566
- openSUSE-SU-2015:0566
- SUSE-SU-2015:0652
- SUSE-SU-2015:0652
- SUSE-SU-2015:0812
- SUSE-SU-2015:0812
- RHSA-2014:1318
- RHSA-2014:1318
- RHSA-2015:0284
- RHSA-2015:0284
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.2
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.2
- [oss-security] 20140911 Multiple Linux USB driver CVE assignment
- [oss-security] 20140911 Multiple Linux USB driver CVE assignment
- 69781
- 69781
- USN-2374-1
- USN-2374-1
- USN-2375-1
- USN-2375-1
- USN-2376-1
- USN-2376-1
- USN-2377-1
- USN-2377-1
- USN-2378-1
- USN-2378-1
- USN-2379-1
- USN-2379-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1141400
- https://bugzilla.redhat.com/show_bug.cgi?id=1141400
- https://code.google.com/p/google-security-research/issues/detail?id=98
- https://code.google.com/p/google-security-research/issues/detail?id=98
- https://github.com/torvalds/linux/commit/6817ae225cd650fb1c3295d769298c38b1eba818
- https://github.com/torvalds/linux/commit/6817ae225cd650fb1c3295d769298c38b1eba818
Modified: 2024-11-21
CVE-2014-3601
The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.16.1 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to (1) cause a denial of service (host OS memory corruption) or possibly have unspecified other impact by triggering a large gfn value or (2) cause a denial of service (host OS memory consumption) by triggering a small gfn value that leads to permanently pinned pages.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=350b8bdd689cd2ab2c67c8a86a0be86cfa0751a7
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=350b8bdd689cd2ab2c67c8a86a0be86cfa0751a7
- SUSE-SU-2015:0481
- SUSE-SU-2015:0481
- openSUSE-SU-2015:0566
- openSUSE-SU-2015:0566
- SUSE-SU-2015:0736
- SUSE-SU-2015:0736
- 60830
- 60830
- 69489
- 69489
- USN-2356-1
- USN-2356-1
- USN-2357-1
- USN-2357-1
- USN-2358-1
- USN-2358-1
- USN-2359-1
- USN-2359-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1131951
- https://bugzilla.redhat.com/show_bug.cgi?id=1131951
- linux-kernel-cve20143601-dos(95689)
- linux-kernel-cve20143601-dos(95689)
- https://github.com/torvalds/linux/commit/350b8bdd689cd2ab2c67c8a86a0be86cfa0751a7
- https://github.com/torvalds/linux/commit/350b8bdd689cd2ab2c67c8a86a0be86cfa0751a7
Modified: 2024-11-21
CVE-2014-3631
The assoc_array_gc function in the associative-array implementation in lib/assoc_array.c in the Linux kernel before 3.16.3 does not properly implement garbage collection, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via multiple "keyctl newring" operations followed by a "keyctl timeout" operation.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=95389b08d93d5c06ec63ab49bd732b0069b7c35e
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=95389b08d93d5c06ec63ab49bd732b0069b7c35e
- 111298
- 111298
- 36268
- 36268
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- 70095
- 70095
- USN-2378-1
- USN-2378-1
- USN-2379-1
- USN-2379-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1140325
- https://bugzilla.redhat.com/show_bug.cgi?id=1140325
- https://github.com/torvalds/linux/commit/95389b08d93d5c06ec63ab49bd732b0069b7c35e
- https://github.com/torvalds/linux/commit/95389b08d93d5c06ec63ab49bd732b0069b7c35e
Modified: 2024-11-21
CVE-2014-4323
The mdp_lut_hw_update function in drivers/video/msm/mdp.c in the MDP display driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not validate certain start and length values within an ioctl call, which allows attackers to gain privileges via a crafted application.
Modified: 2024-11-21
CVE-2014-5206
The do_remount function in fs/namespace.c in the Linux kernel through 3.16.1 does not maintain the MNT_LOCK_READONLY bit across a remount of a bind mount, which allows local users to bypass an intended read-only restriction and defeat certain sandbox protection mechanisms via a "mount -o remount" command within a user namespace.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a6138db815df5ee542d848318e5dae681590fccd
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a6138db815df5ee542d848318e5dae681590fccd
- [oss-security] 20140813 Re: CVE Request: ro bind mount bypass using user namespaces
- [oss-security] 20140813 Re: CVE Request: ro bind mount bypass using user namespaces
- 69214
- 69214
- USN-2317-1
- USN-2317-1
- USN-2318-1
- USN-2318-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1129662
- https://bugzilla.redhat.com/show_bug.cgi?id=1129662
- https://github.com/torvalds/linux/commit/a6138db815df5ee542d848318e5dae681590fccd
- https://github.com/torvalds/linux/commit/a6138db815df5ee542d848318e5dae681590fccd
Modified: 2024-11-21
CVE-2014-5207
fs/namespace.c in the Linux kernel through 3.16.1 does not properly restrict clearing MNT_NODEV, MNT_NOSUID, and MNT_NOEXEC and changing MNT_ATIME_MASK during a remount of a bind mount, which allows local users to gain privileges, interfere with backups and auditing on systems that had atime enabled, or cause a denial of service (excessive filesystem updating) on systems that had atime disabled via a "mount -o remount" command within a user namespace.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9566d6742852c527bf5af38af5cbb878dad75705
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9566d6742852c527bf5af38af5cbb878dad75705
- 110055
- 110055
- http://packetstormsecurity.com/files/128595/Linux-Kernel-3.16.1-FUSE-Privilege-Escalation.html
- http://packetstormsecurity.com/files/128595/Linux-Kernel-3.16.1-FUSE-Privilege-Escalation.html
- [oss-security] 20140812 CVE Request: ro bind mount bypass using user namespaces
- [oss-security] 20140812 CVE Request: ro bind mount bypass using user namespaces
- 34923
- 34923
- [oss-security] 20140813 Re: CVE Request: ro bind mount bypass using user namespaces
- [oss-security] 20140813 Re: CVE Request: ro bind mount bypass using user namespaces
- 69216
- 69216
- USN-2317-1
- USN-2317-1
- USN-2318-1
- USN-2318-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1129662
- https://bugzilla.redhat.com/show_bug.cgi?id=1129662
- linux-kernel-cve20145207-sec-bypass(95266)
- linux-kernel-cve20145207-sec-bypass(95266)
- https://github.com/torvalds/linux/commit/9566d6742852c527bf5af38af5cbb878dad75705
- https://github.com/torvalds/linux/commit/9566d6742852c527bf5af38af5cbb878dad75705
Modified: 2024-11-21
CVE-2014-5471
Stack consumption vulnerability in the parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (uncontrolled recursion, and system crash or reboot) via a crafted iso9660 image with a CL entry referring to a directory entry that has a CL entry.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=410dd3cf4c9b36f27ed4542ee18b1af5e68645a4
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=410dd3cf4c9b36f27ed4542ee18b1af5e68645a4
- SUSE-SU-2014:1316
- SUSE-SU-2014:1316
- SUSE-SU-2014:1319
- SUSE-SU-2014:1319
- SUSE-SU-2015:0481
- SUSE-SU-2015:0481
- openSUSE-SU-2015:0566
- openSUSE-SU-2015:0566
- SUSE-SU-2015:0812
- SUSE-SU-2015:0812
- HPSBGN03285
- HPSBGN03285
- HPSBGN03282
- HPSBGN03282
- RHSA-2014:1318
- RHSA-2014:1318
- RHSA-2015:0102
- RHSA-2015:0102
- RHSA-2015:0695
- RHSA-2015:0695
- RHSA-2015:0782
- RHSA-2015:0782
- RHSA-2015:0803
- RHSA-2015:0803
- [oss-security] 20140826 CVE Request: Linux Kernel unbound recursion in ISOFS
- [oss-security] 20140826 CVE Request: Linux Kernel unbound recursion in ISOFS
- [oss-security] 20140827 Re: CVE Request: Linux Kernel unbound recursion in ISOFS
- [oss-security] 20140827 Re: CVE Request: Linux Kernel unbound recursion in ISOFS
- 69396
- 69396
- USN-2354-1
- USN-2354-1
- USN-2355-1
- USN-2355-1
- USN-2356-1
- USN-2356-1
- USN-2357-1
- USN-2357-1
- USN-2358-1
- USN-2358-1
- USN-2359-1
- USN-2359-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1134099
- https://bugzilla.redhat.com/show_bug.cgi?id=1134099
- https://code.google.com/p/google-security-research/issues/detail?id=88
- https://code.google.com/p/google-security-research/issues/detail?id=88
- linux-kernel-isofs-bo(95481)
- linux-kernel-isofs-bo(95481)
- https://github.com/torvalds/linux/commit/410dd3cf4c9b36f27ed4542ee18b1af5e68645a4
- https://github.com/torvalds/linux/commit/410dd3cf4c9b36f27ed4542ee18b1af5e68645a4
Modified: 2024-11-21
CVE-2014-5472
The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (unkillable mount process) via a crafted iso9660 image with a self-referential CL entry.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=410dd3cf4c9b36f27ed4542ee18b1af5e68645a4
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=410dd3cf4c9b36f27ed4542ee18b1af5e68645a4
- SUSE-SU-2014:1316
- SUSE-SU-2014:1316
- SUSE-SU-2014:1319
- SUSE-SU-2014:1319
- SUSE-SU-2015:0481
- SUSE-SU-2015:0481
- openSUSE-SU-2015:0566
- openSUSE-SU-2015:0566
- SUSE-SU-2015:0812
- SUSE-SU-2015:0812
- HPSBGN03285
- HPSBGN03285
- HPSBGN03282
- HPSBGN03282
- RHSA-2014:1318
- RHSA-2014:1318
- RHSA-2015:0102
- RHSA-2015:0102
- RHSA-2015:0695
- RHSA-2015:0695
- RHSA-2015:0782
- RHSA-2015:0782
- RHSA-2015:0803
- RHSA-2015:0803
- [oss-security] 20140827 Re: CVE Request: Linux Kernel unbound recursion in ISOFS
- [oss-security] 20140827 Re: CVE Request: Linux Kernel unbound recursion in ISOFS
- 69428
- 69428
- USN-2354-1
- USN-2354-1
- USN-2355-1
- USN-2355-1
- USN-2356-1
- USN-2356-1
- USN-2357-1
- USN-2357-1
- USN-2358-1
- USN-2358-1
- USN-2359-1
- USN-2359-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1134099
- https://bugzilla.redhat.com/show_bug.cgi?id=1134099
- https://code.google.com/p/google-security-research/issues/detail?id=88
- https://code.google.com/p/google-security-research/issues/detail?id=88
- linux-kernel-cve20145472-dos(95556)
- linux-kernel-cve20145472-dos(95556)
- https://github.com/torvalds/linux/commit/410dd3cf4c9b36f27ed4542ee18b1af5e68645a4
- https://github.com/torvalds/linux/commit/410dd3cf4c9b36f27ed4542ee18b1af5e68645a4
Modified: 2024-11-21
CVE-2014-6416
Buffer overflow in net/ceph/auth_x.c in Ceph, as used in the Linux kernel before 3.16.3, allows remote attackers to cause a denial of service (memory corruption and panic) or possibly have unspecified other impact via a long unencrypted auth ticket.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8
- http://tracker.ceph.com/issues/8979
- http://tracker.ceph.com/issues/8979
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- [oss-security] 20140915 Re: CVE Request: libceph auth token overflow / Linux kernel
- [oss-security] 20140915 Re: CVE Request: libceph auth token overflow / Linux kernel
- 69805
- 69805
- USN-2376-1
- USN-2376-1
- USN-2377-1
- USN-2377-1
- USN-2378-1
- USN-2378-1
- USN-2379-1
- USN-2379-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1142060
- https://bugzilla.redhat.com/show_bug.cgi?id=1142060
- https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8
- https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8
Modified: 2024-11-21
CVE-2014-6417
net/ceph/auth_x.c in Ceph, as used in the Linux kernel before 3.16.3, does not properly consider the possibility of kmalloc failure, which allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via a long unencrypted auth ticket.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8
- http://tracker.ceph.com/issues/8979
- http://tracker.ceph.com/issues/8979
- http://tracker.ceph.com/issues/9560
- http://tracker.ceph.com/issues/9560
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- [oss-security] 20140915 Re: CVE Request: libceph auth token overflow / Linux kernel
- [oss-security] 20140915 Re: CVE Request: libceph auth token overflow / Linux kernel
- USN-2376-1
- USN-2376-1
- USN-2377-1
- USN-2377-1
- USN-2378-1
- USN-2378-1
- USN-2379-1
- USN-2379-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1142072
- https://bugzilla.redhat.com/show_bug.cgi?id=1142072
- https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8
- https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8
Modified: 2024-11-21
CVE-2014-6418
net/ceph/auth_x.c in Ceph, as used in the Linux kernel before 3.16.3, does not properly validate auth replies, which allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via crafted data from the IP address of a Ceph Monitor.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8
- http://tracker.ceph.com/issues/8979
- http://tracker.ceph.com/issues/8979
- http://tracker.ceph.com/issues/9561
- http://tracker.ceph.com/issues/9561
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- [oss-security] 20140915 Re: CVE Request: libceph auth token overflow / Linux kernel
- [oss-security] 20140915 Re: CVE Request: libceph auth token overflow / Linux kernel
- USN-2376-1
- USN-2376-1
- USN-2377-1
- USN-2377-1
- USN-2378-1
- USN-2378-1
- USN-2379-1
- USN-2379-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1142073
- https://bugzilla.redhat.com/show_bug.cgi?id=1142073
- https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8
- https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8
Modified: 2024-11-21
CVE-2014-7145
The SMB2_tcon function in fs/cifs/smb2pdu.c in the Linux kernel before 3.16.3 allows remote CIFS servers to cause a denial of service (NULL pointer dereference and client system crash) or possibly have unspecified other impact by deleting the IPC$ share during resolution of DFS referrals.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=18f39e7be0121317550d03e267e3ebd4dbfbb3ce
- RHSA-2015:0102
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- [oss-security] 20140922 Re: CVE request: [CIFS] Possible null ptr deref in SMB2_tcon / Linux kernel
- 69867
- USN-2394-1
- https://github.com/torvalds/linux/commit/18f39e7be0121317550d03e267e3ebd4dbfbb3ce
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=18f39e7be0121317550d03e267e3ebd4dbfbb3ce
- https://github.com/torvalds/linux/commit/18f39e7be0121317550d03e267e3ebd4dbfbb3ce
- USN-2394-1
- 69867
- [oss-security] 20140922 Re: CVE request: [CIFS] Possible null ptr deref in SMB2_tcon / Linux kernel
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- RHSA-2015:0102