Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
Astra Linux SE 1.5
Astra Linux SE 1.6
Astra Linux SE 1.7
Astra Linux SE 1.8
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:com.altx-soft.nix:def:23824
[Rus]
Version
3
Class
patch
ALTXid
156724
Language
English
Severity
NotAvailable
Title
DLA-103-1 -- linux-2.6 security update
Description
This security upload has been prepared in cooperation of the Debian Kernel, Security and LTS Teams and features the upstream stable release 2.6.32.64
Family
unix
Platform
Debian GNU/kFreeBSD 6
Debian GNU/Linux 6
Product
linux-2.6
Reference
VENDOR: DLA-103-1
VENDOR: DLA-103-1
Id:
DLA-103-1
Reference:
https://lists.debian.org/debian-lts-announce/2014/debian-lts-announce-201412/msg00006.html
CVE: CVE-2012-6657
CVE: CVE-2012-6657
Id:
CVE-2012-6657
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6657
Comment
: The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5.7 does not ensure that a keepalive action is associated with a stream socket, which allows local users to cause a denial of service (system crash) by leveraging the ability to create a raw socket.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CWE:
264 (Permissions, Privileges, and Access Controls)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=1141742 (CONFIRM)
[oss-security] 20140915 Re: CVE request Linux kernel: net: guard tcp_set_keepalive against crash (MLIST)
https://github.com/torvalds/linux/commit/3e10986d1d698140747fcfc2761ec9cb64c1d582 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.5.7 (CONFIRM)
SUSE-SU-2015:0652 (SUSE)
SUSE-SU-2015:0812 (SUSE)
HPSBGN03285 (HP)
HPSBGN03282 (HP)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3e10986d1d698140747fcfc2761ec9cb64c1d582 (MISC)
CVE: CVE-2013-0228
CVE: CVE-2013-0228
Id:
CVE-2013-0228
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0228
Comment
: The xen_iret function in arch/x86/xen/xen-asm_32.S in the Linux kernel before 3.7.9 on 32-bit Xen paravirt_ops platforms does not properly handle an invalid value in the DS segment register, which allows guest OS users to gain guest OS privileges via a crafted application.
CVSSv2 Score:
6.2
Access vector:
LOCAL
Access complexity:
HIGH
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:H/Au:N/C:C/I:C/A:C
CWE:
189 (Numeric Errors)
References:
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.9 (CONFIRM)
https://github.com/torvalds/linux/commit/13d2b4d11d69a92574a55bfd985cfb0ca77aebdc (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=906309 (CONFIRM)
[oss-security] 20130213 Xen Security Advisory 42 (CVE-2013-0228) - Linux kernel hits general protection if %ds is corrupt for 32-bit PVOPS. (MLIST)
USN-1795-1 (UBUNTU)
USN-1796-1 (UBUNTU)
USN-1797-1 (UBUNTU)
USN-1805-1 (UBUNTU)
USN-1808-1 (UBUNTU)
MDVSA-2013:176 (MANDRIVA)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=13d2b4d11d69a92574a55bfd985cfb0ca77aebdc (MISC)
CVE: CVE-2013-7266
CVE: CVE-2013-7266
Id:
CVE-2013-7266
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7266
Comment
: The mISDN_sock_recvmsg function in drivers/isdn/mISDN/socket.c in the Linux kernel before 3.12.4 does not ensure that a certain length value is consistent with the size of an associated data structure, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:N/A:N
CWE:
20 (Improper Input Validation)
References:
https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c (CONFIRM)
[oss-security] 20131231 Re: CVE request: Linux kernel: net: memory leak in recvmsg handlermsg_name & msg_namelen logic (MLIST)
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=1039845 (CONFIRM)
56036 (SECUNIA)
55882 (SECUNIA)
USN-2109-1 (UBUNTU)
USN-2113-1 (UBUNTU)
USN-2117-1 (UBUNTU)
USN-2110-1 (UBUNTU)
USN-2138-1 (UBUNTU)
USN-2136-1 (UBUNTU)
USN-2129-1 (UBUNTU)
USN-2128-1 (UBUNTU)
USN-2139-1 (UBUNTU)
USN-2141-1 (UBUNTU)
USN-2135-1 (UBUNTU)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c ()
CVE: CVE-2014-4157
CVE: CVE-2014-4157
Id:
CVE-2014-4157
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4157
Comment
: arch/mips/include/asm/thread_info.h in the Linux kernel before 3.14.8 on the MIPS platform does not configure _TIF_SECCOMP checks on the fast system-call path, which allows local users to bypass intended PR_SET_SECCOMP restrictions by executing a crafted application without invoking a trace or audit subsystem.
CVSSv2 Score:
4.6
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P
CWE:
264 (Permissions, Privileges, and Access Controls)
References:
https://github.com/torvalds/linux/commit/137f7df8cead00688524c82360930845396b8a21 (CONFIRM)
[oss-security] 20140616 Re: Bug#751417: linux-image-3.2.0-4-5kc-malta: no SIGKILL after prctl(PR_SET_SECCOMP, 1, ...) on MIPS (MLIST)
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.8 (CONFIRM)
[oss-security] 20140617 Re: (Linux kernel) Bug#751417: linux-image-3.2.0-4-5kc-malta: no SIGKILL after prctl(PR_SET_SECCOMP, 1, ...) on MIPS (MLIST)
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751417 (CONFIRM)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=137f7df8cead00688524c82360930845396b8a21 ()
CVE: CVE-2014-4508
CVE: CVE-2014-4508
Id:
CVE-2014-4508
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508
Comment
: arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000.
CVSSv2 Score:
4.7
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:N/I:N/A:C
CWE:
189 (Numeric Errors)
References:
[oss-security] 20140619 CVE request: Another Linux syscall auditing bug (MLIST)
[oss-security] 20140620 Re: CVE request: Another Linux syscall auditing bug (MLIST)
[linux-kernel] 20140616 Re: 3.15: kernel BUG at kernel/auditsc.c:1525! (MLIST)
58964 (SECUNIA)
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.61 (CONFIRM)
60564 (SECUNIA)
USN-2334-1 (UBUNTU)
SUSE-SU-2014:1316 (SUSE)
SUSE-SU-2014:1319 (SUSE)
openSUSE-SU-2015:0566 (SUSE)
68126 (BID)
[oss-security] 20201112 CVE-2014-4508 (MLIST)
CVE: CVE-2014-4653
CVE: CVE-2014-4653
Id:
CVE-2014-4653
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4653
Comment
: sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which allows local users to cause a denial of service (use-after-free) and obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access.
CVSSv2 Score:
4.6
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P
CWE:
416 (Use After Free)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=1113409 (CONFIRM)
https://github.com/torvalds/linux/commit/fd9f26e4eca5d08a27d12c0933fceef76ed9663d (CONFIRM)
[oss-security] 20140626 Re: CVE Request: Linux kernel ALSA core control API vulnerabilities (MLIST)
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2 (CONFIRM)
59434 (SECUNIA)
68164 (BID)
59777 (SECUNIA)
60564 (SECUNIA)
RHSA-2014:1083 (REDHAT)
USN-2334-1 (UBUNTU)
USN-2335-1 (UBUNTU)
SUSE-SU-2015:0812 (SUSE)
60545 (SECUNIA)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fd9f26e4eca5d08a27d12c0933fceef76ed9663d ()
CVE: CVE-2014-4654
CVE: CVE-2014-4654
Id:
CVE-2014-4654
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4654
Comment
: The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not check authorization for SNDRV_CTL_IOCTL_ELEM_REPLACE commands, which allows local users to remove kernel controls and cause a denial of service (use-after-free and system crash) by leveraging /dev/snd/controlCX access for an ioctl call.
CVSSv2 Score:
4.6
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P
CWE:
416 (Use After Free)
References:
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2 (CONFIRM)
https://github.com/torvalds/linux/commit/82262a46627bebb0febcc26664746c25cef08563 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=1113445 (CONFIRM)
[oss-security] 20140626 Re: CVE Request: Linux kernel ALSA core control API vulnerabilities (MLIST)
59434 (SECUNIA)
68162 (BID)
59777 (SECUNIA)
60564 (SECUNIA)
RHSA-2014:1083 (REDHAT)
USN-2334-1 (UBUNTU)
USN-2335-1 (UBUNTU)
SUSE-SU-2015:0812 (SUSE)
60545 (SECUNIA)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=82262a46627bebb0febcc26664746c25cef08563 ()
CVE: CVE-2014-4655
CVE: CVE-2014-4655
Id:
CVE-2014-4655
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4655
Comment
: The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not properly maintain the user_ctl_count value, which allows local users to cause a denial of service (integer overflow and limit bypass) by leveraging /dev/snd/controlCX access for a large number of SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl calls.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CWE:
190 (Integer Overflow or Wraparound)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=1113445 (CONFIRM)
https://github.com/torvalds/linux/commit/82262a46627bebb0febcc26664746c25cef08563 (CONFIRM)
[oss-security] 20140626 Re: CVE Request: Linux kernel ALSA core control API vulnerabilities (MLIST)
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2 (CONFIRM)
59434 (SECUNIA)
68162 (BID)
59777 (SECUNIA)
60564 (SECUNIA)
RHSA-2014:1083 (REDHAT)
USN-2334-1 (UBUNTU)
USN-2335-1 (UBUNTU)
SUSE-SU-2015:0812 (SUSE)
60545 (SECUNIA)
1036763 (SECTRACK)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=82262a46627bebb0febcc26664746c25cef08563 ()
CVE: CVE-2014-4943
CVE: CVE-2014-4943
Id:
CVE-2014-4943
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943
Comment
: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket.
CVSSv2 Score:
6.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C
CWE:
269 (Improper Privilege Management)
References:
[oss-security] 20140716 CVE-2014-4943: Linux privilege escalation in ppp over l2tp sockets (MLIST)
https://github.com/torvalds/linux/commit/3cf521f7dc87c031617fd47e4b7aa2593c2f3daf (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=1119458 (CONFIRM)
60393 (SECUNIA)
60011 (SECUNIA)
http://linux.oracle.com/errata/ELSA-2014-0924.html (CONFIRM)
http://linux.oracle.com/errata/ELSA-2014-3047.html (CONFIRM)
60071 (SECUNIA)
http://linux.oracle.com/errata/ELSA-2014-3048.html (CONFIRM)
60220 (SECUNIA)
60380 (SECUNIA)
1030610 (SECTRACK)
DSA-2992 (DEBIAN)
RHSA-2014:1025 (REDHAT)
SUSE-SU-2014:1316 (SUSE)
SUSE-SU-2014:1319 (SUSE)
36267 (EXPLOIT-DB)
109277 (OSVDB)
SUSE-SU-2015:0481 (SUSE)
openSUSE-SU-2015:0566 (SUSE)
59790 (SECUNIA)
linux-kernel-cve20144943-priv-esc(94665) (XF)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3cf521f7dc87c031617fd47e4b7aa2593c2f3daf ()
CVE: CVE-2014-5077
CVE: CVE-2014-5077
Id:
CVE-2014-5077
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077
Comment
: The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction.
CVSSv2 Score:
7.1
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:C
CWE:
476 (NULL Pointer Dereference)
References:
[oss-security] 20140725 Re: CVE request Linux Kernel: net: SCTP: NULL pointer dereference (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=1122982 (CONFIRM)
https://github.com/torvalds/linux/commit/1be9a950c646c9092fb3618197f7b6bfb50e82aa (CONFIRM)
59777 (SECUNIA)
60564 (SECUNIA)
RHSA-2014:1083 (REDHAT)
USN-2358-1 (UBUNTU)
USN-2334-1 (UBUNTU)
USN-2335-1 (UBUNTU)
USN-2359-1 (UBUNTU)
60744 (SECUNIA)
RHSA-2014:1668 (REDHAT)
RHSA-2014:1763 (REDHAT)
SUSE-SU-2014:1316 (SUSE)
SUSE-SU-2014:1319 (SUSE)
62563 (SECUNIA)
1030681 (SECTRACK)
68881 (BID)
60545 (SECUNIA)
60430 (SECUNIA)
linux-kernel-cve20145077-dos(95134) (XF)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1be9a950c646c9092fb3618197f7b6bfb50e82aa (MISC)
CVE: CVE-2014-5471
CVE: CVE-2014-5471
Id:
CVE-2014-5471
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471
Comment
: Stack consumption vulnerability in the parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (uncontrolled recursion, and system crash or reboot) via a crafted iso9660 image with a CL entry referring to a directory entry that has a CL entry.
CVSSv2 Score:
4
Access vector:
LOCAL
Access complexity:
HIGH
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:H/Au:N/C:N/I:N/A:C
CWE:
399 (Resource Management Errors)
References:
[oss-security] 20140827 Re: CVE Request: Linux Kernel unbound recursion in ISOFS (MLIST)
https://code.google.com/p/google-security-research/issues/detail?id=88 (MISC)
https://bugzilla.redhat.com/show_bug.cgi?id=1134099 (CONFIRM)
https://github.com/torvalds/linux/commit/410dd3cf4c9b36f27ed4542ee18b1af5e68645a4 (CONFIRM)
USN-2355-1 (UBUNTU)
USN-2354-1 (UBUNTU)
USN-2358-1 (UBUNTU)
USN-2359-1 (UBUNTU)
USN-2357-1 (UBUNTU)
USN-2356-1 (UBUNTU)
RHSA-2014:1318 (REDHAT)
SUSE-SU-2014:1316 (SUSE)
SUSE-SU-2014:1319 (SUSE)
SUSE-SU-2015:0481 (SUSE)
RHSA-2015:0102 (REDHAT)
RHSA-2015:0695 (REDHAT)
openSUSE-SU-2015:0566 (SUSE)
RHSA-2015:0782 (REDHAT)
RHSA-2015:0803 (REDHAT)
SUSE-SU-2015:0812 (SUSE)
HPSBGN03285 (HP)
HPSBGN03282 (HP)
69396 (BID)
[oss-security] 20140826 CVE Request: Linux Kernel unbound recursion in ISOFS (MLIST)
linux-kernel-isofs-bo(95481) (XF)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=410dd3cf4c9b36f27ed4542ee18b1af5e68645a4 ()
CVE: CVE-2014-5472
CVE: CVE-2014-5472
Id:
CVE-2014-5472
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472
Comment
: The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (unkillable mount process) via a crafted iso9660 image with a self-referential CL entry.
CVSSv2 Score:
4
Access vector:
LOCAL
Access complexity:
HIGH
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:H/Au:N/C:N/I:N/A:C
CWE:
20 (Improper Input Validation)
References:
[oss-security] 20140827 Re: CVE Request: Linux Kernel unbound recursion in ISOFS (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=1134099 (CONFIRM)
https://github.com/torvalds/linux/commit/410dd3cf4c9b36f27ed4542ee18b1af5e68645a4 (CONFIRM)
https://code.google.com/p/google-security-research/issues/detail?id=88 (MISC)
USN-2355-1 (UBUNTU)
USN-2354-1 (UBUNTU)
USN-2358-1 (UBUNTU)
USN-2359-1 (UBUNTU)
USN-2357-1 (UBUNTU)
USN-2356-1 (UBUNTU)
RHSA-2014:1318 (REDHAT)
SUSE-SU-2014:1316 (SUSE)
SUSE-SU-2014:1319 (SUSE)
SUSE-SU-2015:0481 (SUSE)
RHSA-2015:0102 (REDHAT)
RHSA-2015:0695 (REDHAT)
openSUSE-SU-2015:0566 (SUSE)
RHSA-2015:0782 (REDHAT)
RHSA-2015:0803 (REDHAT)
SUSE-SU-2015:0812 (SUSE)
HPSBGN03285 (HP)
HPSBGN03282 (HP)
69428 (BID)
linux-kernel-cve20145472-dos(95556) (XF)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=410dd3cf4c9b36f27ed4542ee18b1af5e68645a4 ()
CVE: CVE-2014-9090
CVE: CVE-2014-9090
Id:
CVE-2014-9090
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9090
Comment
: The do_double_fault function in arch/x86/kernel/traps.c in the Linux kernel through 3.17.4 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to cause a denial of service (panic) via a modify_ldt system call, as demonstrated by sigreturn_32 in the linux-clock-tests test suite.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CWE:
17 (Code)
References:
[oss-security] 20141126 Re: CVE Request: Linux kernel LDT handling bugs (MLIST)
https://github.com/torvalds/linux/commit/6f442be2fb22be02cafa606f1769fa1e6f894441 (CONFIRM)
62336 (SECUNIA)
DSA-3093 (DEBIAN)
openSUSE-SU-2015:0566 (SUSE)
SUSE-SU-2015:0812 (SUSE)
SUSE-SU-2015:0736 (SUSE)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6f442be2fb22be02cafa606f1769fa1e6f894441 ()
Content available only for registered users!
ovaldb@altx-soft.com