var-201406-0230
Vulnerability from variot
The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator. The NFSv4 implementation is one of the distributed file system protocols. The vulnerability is due to the fact that the program does not initialize the data structure correctly. ============================================================================ Ubuntu Security Notice USN-2336-1 September 02, 2014
linux-lts-trusty vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description: - linux-lts-trusty: Linux hardware enablement kernel from Trusty
Details:
A flaw was discovered in the Linux kernel virtual machine's (kvm) validation of interrupt requests (irq). A guest OS user could exploit this flaw to cause a denial of service (host OS crash). (CVE-2014-0155)
Andy Lutomirski discovered a flaw in the authorization of netlink socket operations when a socket is passed to a process of more privilege. (CVE-2014-0181)
An information leak was discovered in the Linux kernels aio_read_events_ring function. (CVE-2014-4027)
Sasha Levin reported an issue with the Linux kernel's shared memory subsystem when used with range notifications and hole punching. (CVE-2014-4171)
Toralf F=C3=B6rster reported an error in the Linux kernels syscall auditing on 32 bit x86 platforms. (CVE-2014-4667)
Vasily Averin discover a reference count flaw during attempts to umount in conjunction with a symlink. (CVE-2014-5045)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04 LTS: linux-image-3.13.0-35-generic 3.13.0-35.62~precise1 linux-image-3.13.0-35-generic-lpae 3.13.0-35.62~precise1
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-server, linux-powerpc), a standard system upgrade will automatically perform this as well. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Mandriva Linux Security Advisory MDVSA-2014:155 http://www.mandriva.com/en/support/security/
Package : kernel Date : August 7, 2014 Affected: Business Server 1.0
Problem Description:
Multiple vulnerabilities has been found and corrected in the Linux kernel:
Multiple buffer overflows in drivers/staging/wlags49_h2/wl_priv.c in the Linux kernel before 3.12 allow local users to cause a denial of service or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability and providing a long station-name string, related to the (1) wvlan_uil_put_info and (2) wvlan_set_station_nickname functions (CVE-2013-4514).
The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls (CVE-2014-4699). The verification of md5 checksums and GPG signatures is performed automatically for you. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/support/security/advisories/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
iD8DBQFT4yfXmqjQ0CJFipgRAuk5AKDbuUKogDrhb4iKIs1yOP4IQdpAcwCgodf8 OMQTfJFCDxSAMSI8iUevOkc= =mxBf -----END PGP SIGNATURE----- . (CVE-2014-4943)
Michael S. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2014:1971-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1971.html Issue date: 2014-12-09 CVE Names: CVE-2013-2929 CVE-2014-1739 CVE-2014-3181 CVE-2014-3182 CVE-2014-3184 CVE-2014-3185 CVE-2014-3186 CVE-2014-3631 CVE-2014-3673 CVE-2014-3687 CVE-2014-3688 CVE-2014-4027 CVE-2014-4652 CVE-2014-4654 CVE-2014-4655 CVE-2014-4656 CVE-2014-5045 CVE-2014-6410 =====================================================================
- Summary:
Updated kernel packages that fix multiple security issues and several bugs are now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64
-
Description:
-
A flaw was found in the way the Linux kernel's SCTP implementation handled malformed or duplicate Address Configuration Change Chunks (ASCONF). A remote attacker could use either of these flaws to crash the system. (CVE-2014-3673, CVE-2014-3687, Important)
-
A flaw was found in the way the Linux kernel's SCTP implementation handled the association's output queue. A remote attacker could send specially crafted packets that would cause the system to use an excessive amount of memory, leading to a denial of service. (CVE-2014-3688, Important)
-
Two flaws were found in the way the Apple Magic Mouse/Trackpad multi-touch driver and the Minibox PicoLCD driver handled invalid HID reports. An attacker with physical access to the system could use these flaws to crash the system or, potentially, escalate their privileges on the system. (CVE-2014-3181, CVE-2014-3186, Moderate)
-
A memory corruption flaw was found in the way the USB ConnectTech WhiteHEAT serial driver processed completion commands sent via USB Request Blocks buffers. An attacker with physical access to the system could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2014-3185, Moderate)
-
A flaw was found in the way the Linux kernel's keys subsystem handled the termination condition in the associative array garbage collection functionality. A local, unprivileged user could use this flaw to crash the system. (CVE-2014-3631, Moderate)
-
Multiple flaws were found in the way the Linux kernel's ALSA implementation handled user controls. A local, privileged user could use either of these flaws to crash the system. (CVE-2014-4654, CVE-2014-4655, CVE-2014-4656, Moderate)
-
A flaw was found in the way the Linux kernel's VFS subsystem handled reference counting when performing unmount operations on symbolic links. A local, unprivileged user could use this flaw to exhaust all available memory on the system or, potentially, trigger a use-after-free error, resulting in a system crash or privilege escalation. (CVE-2014-5045, Moderate)
-
A flaw was found in the way the get_dumpable() function return value was interpreted in the ptrace subsystem of the Linux kernel. When 'fs.suid_dumpable' was set to 2, a local, unprivileged local user could use this flaw to bypass intended ptrace restrictions and obtain potentially sensitive information. (CVE-2013-2929, Low)
-
A stack overflow flaw caused by infinite recursion was found in the way the Linux kernel's UDF file system implementation processed indirect ICBs. An attacker with physical access to the system could use a specially crafted UDF image to crash the system. (CVE-2014-1739, Low)
-
An out-of-bounds read flaw in the Logitech Unifying receiver driver could allow an attacker with physical access to the system to crash the system or, potentially, escalate their privileges on the system. (CVE-2014-3182, Low)
-
Multiple out-of-bounds write flaws were found in the way the Cherry Cymotion keyboard driver, KYE/Genius device drivers, Logitech device drivers, Monterey Genius KB29E keyboard driver, Petalynx Maxter remote control driver, and Sunplus wireless desktop driver handled invalid HID reports. An attacker with physical access to the system could use either of these flaws to write data past an allocated memory buffer. (CVE-2014-3184, Low)
-
An information leak flaw was found in the RAM Disks Memory Copy (rd_mcp) back end driver of the iSCSI Target subsystem could allow a privileged user to leak the contents of kernel memory to an iSCSI initiator remote client. (CVE-2014-4652, Low)
-
Solution:
Red Hat would like to thank Frey Alfredsson for reporting CVE-2014-3631, and Vasily Averin of Parallels for reporting CVE-2014-5045. The CVE-2014-3673 was discovered by Liu Wei of Red Hat.
All kernel users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect.
Before applying this update, make sure all previously released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258
To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm -Uvh" as that will remove the running kernel binaries from your system. You may use "rpm -e" to remove old kernels after determining that the new kernel functions properly on your system.
- Bugs fixed (https://bugzilla.redhat.com/):
1028148 - CVE-2013-2929 kernel: exec/ptrace: get_dumpable() incorrect tests 1108744 - CVE-2014-4027 Kernel: target/rd: imformation leakage 1109774 - CVE-2014-1739 Kernel: drivers: media: an information leakage 1113406 - CVE-2014-4652 Kernel: ALSA: control: protect user controls against races & memory disclosure 1113445 - CVE-2014-4654 CVE-2014-4655 Kernel: ALSA: control: use-after-free in replacing user controls 1113470 - CVE-2014-4656 Kernel: ALSA: control: integer overflow in id.index & id.numid 1122472 - CVE-2014-5045 kernel: vfs: refcount issues during unmount on symlink 1140325 - CVE-2014-3631 kernel: keys: incorrect termination condition in assoc array garbage collection 1141173 - CVE-2014-3181 Kernel: HID: OOB write in magicmouse driver 1141210 - CVE-2014-3182 Kernel: HID: logitech-dj OOB array access 1141391 - CVE-2014-3184 Kernel: HID: off by one error in various _report_fixup routines 1141400 - CVE-2014-3185 Kernel: USB serial: memory corruption flaw 1141407 - CVE-2014-3186 Kernel: HID: memory corruption via OOB write 1141809 - CVE-2014-6410 kernel: udf: Avoid infinite loop when processing indirect ICBs 1147850 - CVE-2014-3673 kernel: sctp: skb_over_panic when receiving malformed ASCONF chunks 1155731 - CVE-2014-3687 kernel: net: sctp: fix panic on duplicate ASCONF chunks 1155745 - CVE-2014-3688 kernel: net: sctp: remote memory pressure from excessive queueing
- Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: kernel-3.10.0-123.13.1.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-123.13.1.el7.noarch.rpm
x86_64: kernel-3.10.0-123.13.1.el7.x86_64.rpm kernel-debug-3.10.0-123.13.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-123.13.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-123.13.1.el7.x86_64.rpm kernel-devel-3.10.0-123.13.1.el7.x86_64.rpm kernel-headers-3.10.0-123.13.1.el7.x86_64.rpm kernel-tools-3.10.0-123.13.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-123.13.1.el7.x86_64.rpm perf-3.10.0-123.13.1.el7.x86_64.rpm perf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
noarch: kernel-doc-3.10.0-123.13.1.el7.noarch.rpm
x86_64: kernel-debug-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-123.13.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-123.13.1.el7.x86_64.rpm perf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm python-perf-3.10.0-123.13.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: kernel-3.10.0-123.13.1.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-123.13.1.el7.noarch.rpm
x86_64: kernel-3.10.0-123.13.1.el7.x86_64.rpm kernel-debug-3.10.0-123.13.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-123.13.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-123.13.1.el7.x86_64.rpm kernel-devel-3.10.0-123.13.1.el7.x86_64.rpm kernel-headers-3.10.0-123.13.1.el7.x86_64.rpm kernel-tools-3.10.0-123.13.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-123.13.1.el7.x86_64.rpm perf-3.10.0-123.13.1.el7.x86_64.rpm perf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
noarch: kernel-doc-3.10.0-123.13.1.el7.noarch.rpm
x86_64: kernel-debug-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-123.13.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-123.13.1.el7.x86_64.rpm perf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm python-perf-3.10.0-123.13.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: kernel-3.10.0-123.13.1.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-123.13.1.el7.noarch.rpm
ppc64: kernel-3.10.0-123.13.1.el7.ppc64.rpm kernel-bootwrapper-3.10.0-123.13.1.el7.ppc64.rpm kernel-debug-3.10.0-123.13.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-123.13.1.el7.ppc64.rpm kernel-debug-devel-3.10.0-123.13.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-123.13.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-123.13.1.el7.ppc64.rpm kernel-devel-3.10.0-123.13.1.el7.ppc64.rpm kernel-headers-3.10.0-123.13.1.el7.ppc64.rpm kernel-tools-3.10.0-123.13.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-123.13.1.el7.ppc64.rpm kernel-tools-libs-3.10.0-123.13.1.el7.ppc64.rpm perf-3.10.0-123.13.1.el7.ppc64.rpm perf-debuginfo-3.10.0-123.13.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-123.13.1.el7.ppc64.rpm
s390x: kernel-3.10.0-123.13.1.el7.s390x.rpm kernel-debug-3.10.0-123.13.1.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-123.13.1.el7.s390x.rpm kernel-debug-devel-3.10.0-123.13.1.el7.s390x.rpm kernel-debuginfo-3.10.0-123.13.1.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-123.13.1.el7.s390x.rpm kernel-devel-3.10.0-123.13.1.el7.s390x.rpm kernel-headers-3.10.0-123.13.1.el7.s390x.rpm kernel-kdump-3.10.0-123.13.1.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-123.13.1.el7.s390x.rpm kernel-kdump-devel-3.10.0-123.13.1.el7.s390x.rpm perf-3.10.0-123.13.1.el7.s390x.rpm perf-debuginfo-3.10.0-123.13.1.el7.s390x.rpm python-perf-debuginfo-3.10.0-123.13.1.el7.s390x.rpm
x86_64: kernel-3.10.0-123.13.1.el7.x86_64.rpm kernel-debug-3.10.0-123.13.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-123.13.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-123.13.1.el7.x86_64.rpm kernel-devel-3.10.0-123.13.1.el7.x86_64.rpm kernel-headers-3.10.0-123.13.1.el7.x86_64.rpm kernel-tools-3.10.0-123.13.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-123.13.1.el7.x86_64.rpm perf-3.10.0-123.13.1.el7.x86_64.rpm perf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
noarch: kernel-doc-3.10.0-123.13.1.el7.noarch.rpm
ppc64: kernel-debug-debuginfo-3.10.0-123.13.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-123.13.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-123.13.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-123.13.1.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-123.13.1.el7.ppc64.rpm perf-debuginfo-3.10.0-123.13.1.el7.ppc64.rpm python-perf-3.10.0-123.13.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-123.13.1.el7.ppc64.rpm
s390x: kernel-debug-debuginfo-3.10.0-123.13.1.el7.s390x.rpm kernel-debuginfo-3.10.0-123.13.1.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-123.13.1.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-123.13.1.el7.s390x.rpm perf-debuginfo-3.10.0-123.13.1.el7.s390x.rpm python-perf-3.10.0-123.13.1.el7.s390x.rpm python-perf-debuginfo-3.10.0-123.13.1.el7.s390x.rpm
x86_64: kernel-debug-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-123.13.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-123.13.1.el7.x86_64.rpm perf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm python-perf-3.10.0-123.13.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: kernel-3.10.0-123.13.1.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-123.13.1.el7.noarch.rpm
x86_64: kernel-3.10.0-123.13.1.el7.x86_64.rpm kernel-debug-3.10.0-123.13.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-123.13.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-123.13.1.el7.x86_64.rpm kernel-devel-3.10.0-123.13.1.el7.x86_64.rpm kernel-headers-3.10.0-123.13.1.el7.x86_64.rpm kernel-tools-3.10.0-123.13.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-123.13.1.el7.x86_64.rpm perf-3.10.0-123.13.1.el7.x86_64.rpm perf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
noarch: kernel-doc-3.10.0-123.13.1.el7.noarch.rpm
x86_64: kernel-debug-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-123.13.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-123.13.1.el7.x86_64.rpm perf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm python-perf-3.10.0-123.13.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410 https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFUh2CJXlSAg2UNWIIRArzSAJ95AhqaUI998VyNBJGQaTXfSHeJuQCdFjTp 6IsJOT0XYi+TiyneMDOm9f4= =a0Ai -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Relevant releases/architectures:
MRG Realtime for RHEL 6 Server v.2 - noarch, x86_64
-
(CVE-2014-3153, Important)
-
It was found that the Linux kernel's ptrace subsystem allowed a traced process' instruction pointer to be set to a non-canonical memory address without forcing the non-sysret code path when returning to user space. (CVE-2014-4699, Important)
Note: The CVE-2014-4699 issue only affected systems using an Intel CPU.
-
It was found that the permission checks performed by the Linux kernel when a netlink message was received were not sufficient. (CVE-2014-0181, Moderate)
-
It was found that the aio_read_events_ring() function of the Linux kernel's Asynchronous I/O (AIO) subsystem did not properly sanitize the AIO ring head received from user space. (CVE-2014-0206, Moderate)
-
An out-of-bounds memory access flaw was found in the Netlink Attribute extension of the Berkeley Packet Filter (BPF) interpreter functionality in the Linux kernel's networking implementation. Google acknowledges Pinkie Pie as the original reporter of CVE-2014-3153. Bugs fixed (https://bugzilla.redhat.com/):
1094265 - CVE-2014-0181 kernel: net: insufficient permision checks of netlink messages 1094602 - CVE-2014-0206 kernel: aio: insufficient sanitization of head in aio_read_events_ring() 1096775 - CVE-2014-3144 CVE-2014-3145 Kernel: filter: prevent nla extensions to peek beyond the end of the message 1102571 - CVE-2014-3917 kernel: DoS with syscall auditing 1103626 - CVE-2014-3153 kernel: futex: pi futexes requeue issue 1104097 - CVE-2014-3940 Kernel: missing check during hugepage migration 1108744 - CVE-2014-4027 Kernel: target/rd: imformation leakage 1113967 - CVE-2014-4667 kernel: sctp: sk_ack_backlog wrap-around problem 1115927 - CVE-2014-4699 kernel: x86_64: ptrace: sysret to non-canonical address
6
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201406-0230", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "kernel", "scope": "lt", "trust": 1.8, "vendor": "linux", "version": "3.14" }, { "model": "big-ip analytics", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "12.0.0" }, { "model": "enterprise manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "3.1.1" }, { "model": "big-ip link controller", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "12.0.0" }, { "model": "big-ip global traffic manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.6.0" }, { "model": "big-iq application delivery controller", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "4.5.0" }, { "model": "big-ip advanced firewall manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.3.0" }, { "model": "big-ip local traffic manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip access policy manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip policy enforcement manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.3.0" }, { "model": "big-ip analytics", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.6.0" }, { "model": "big-iq device", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "4.5.0" }, { "model": "big-iq security", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "4.5.0" }, { "model": "big-ip application security manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "12.0.0" }, { "model": "big-ip link controller", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.6.0" }, { "model": "big-iq device", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "4.2.0" }, { "model": "big-ip protocol security module", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.4.1" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "12.04" }, { "model": "linux enterprise high availability extension", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "big-iq security", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "4.0.0" }, { "model": "big-ip edge gateway", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip advanced firewall manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "12.0.0" }, { "model": "big-ip wan optimization manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip global traffic manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.1.0" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "big-ip local traffic manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "12.0.0" }, { "model": "big-ip application security manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip policy enforcement manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "12.0.0" }, { "model": "big-ip access policy manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "12.0.0" }, { "model": "big-ip analytics", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip edge gateway", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.3.0" }, { "model": "big-ip application acceleration manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.4.0" }, { "model": "big-ip advanced firewall manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.6.0" }, { "model": "linux enterprise server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "big-ip link controller", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip application acceleration manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "12.0.0" }, { "model": "big-ip domain name system", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "12.0.0" }, { "model": "big-iq cloud", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "4.5.0" }, { "model": "big-ip local traffic manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip access policy manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip policy enforcement manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip wan optimization manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.3.0" }, { "model": "big-ip webaccelerator", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.1.0" }, { "model": "enterprise manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "3.0.0" }, { "model": "big-ip application acceleration manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.6.0" }, { "model": "big-iq cloud", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "4.0.0" }, { "model": "big-ip protocol security module", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip webaccelerator", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.3.0" }, { "model": "big-ip application security manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.1.0" }, { "model": "linux enterprise real time extension", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "kernel", "scope": "eq", "trust": 0.6, "vendor": "linux", "version": "3.4.37" }, { "model": "kernel", "scope": "eq", "trust": 0.6, "vendor": "linux", "version": "3.4.38" }, { "model": "kernel", "scope": "eq", "trust": 0.6, "vendor": "linux", "version": "3.4.36" }, { "model": "kernel", "scope": "eq", "trust": 0.6, "vendor": "linux", "version": "3.4.39" }, { "model": "kernel", "scope": "eq", "trust": 0.6, "vendor": "linux", "version": "3.4.34" }, { "model": "kernel", "scope": "eq", "trust": 0.6, "vendor": "linux", "version": "3.4.31" }, { "model": "kernel", "scope": "eq", "trust": 0.6, "vendor": "linux", "version": "3.4.35" }, { "model": "kernel", "scope": "eq", "trust": 0.6, "vendor": "linux", "version": "3.4.32" }, { "model": "kernel", "scope": "eq", "trust": 0.6, "vendor": "linux", "version": "3.4.33" }, { "model": "kernel", "scope": "eq", "trust": 0.6, "vendor": "linux", "version": "3.4.3" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-003017" }, { "db": "CNNVD", "id": "CNNVD-201406-527" }, { "db": "NVD", "id": "CVE-2014-4027" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.14", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-iq_application_delivery_controller:4.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-iq_security:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "4.5.0", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-iq_device:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "4.5.0", "versionStartIncluding": "4.2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-iq_cloud:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "4.5.0", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:enterprise_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.1.1", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.3.0", "versionStartIncluding": "11.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.4.1", "versionStartIncluding": "11.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.3.0", "versionStartIncluding": "11.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.3.0", "versionStartIncluding": "11.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.0", "versionStartIncluding": "11.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.0", "versionStartIncluding": "11.3.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.0", "versionStartIncluding": "11.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.0", "versionStartIncluding": "11.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.0", "versionStartIncluding": "11.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.0", "versionStartIncluding": "11.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.0", "versionStartIncluding": "11.3.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.0", "versionStartIncluding": "11.4.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.0", "versionStartIncluding": "11.1.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-4027" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ubuntu", "sources": [ { "db": "PACKETSTORM", "id": "128090" }, { "db": "PACKETSTORM", "id": "128089" }, { "db": "PACKETSTORM", "id": "127515" }, { "db": "PACKETSTORM", "id": "128091" } ], "trust": 0.4 }, "cve": "CVE-2014-4027", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 4.4, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Adjacent Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.3, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2014-4027", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 4.4, "id": "VHN-71967", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:A/AC:M/AU:S/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2014-4027", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-201406-527", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-71967", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-71967" }, { "db": "JVNDB", "id": "JVNDB-2014-003017" }, { "db": "CNNVD", "id": "CNNVD-201406-527" }, { "db": "NVD", "id": "CVE-2014-4027" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator. The NFSv4 implementation is one of the distributed file system protocols. The vulnerability is due to the fact that the program does not initialize the data structure correctly. ============================================================================\nUbuntu Security Notice USN-2336-1\nSeptember 02, 2014\n\nlinux-lts-trusty vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 12.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in the kernel. \n\nSoftware Description:\n- linux-lts-trusty: Linux hardware enablement kernel from Trusty\n\nDetails:\n\nA flaw was discovered in the Linux kernel virtual machine\u0027s (kvm)\nvalidation of interrupt requests (irq). A guest OS user could exploit this\nflaw to cause a denial of service (host OS crash). (CVE-2014-0155)\n\nAndy Lutomirski discovered a flaw in the authorization of netlink socket\noperations when a socket is passed to a process of more privilege. \n(CVE-2014-0181)\n\nAn information leak was discovered in the Linux kernels\naio_read_events_ring function. (CVE-2014-4027)\n\nSasha Levin reported an issue with the Linux kernel\u0027s shared memory\nsubsystem when used with range notifications and hole punching. (CVE-2014-4171)\n\nToralf F=C3=B6rster reported an error in the Linux kernels syscall auditing on\n32 bit x86 platforms. (CVE-2014-4667)\n\nVasily Averin discover a reference count flaw during attempts to umount in\nconjunction with a symlink. (CVE-2014-5045)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 12.04 LTS:\n linux-image-3.13.0-35-generic 3.13.0-35.62~precise1\n linux-image-3.13.0-35-generic-lpae 3.13.0-35.62~precise1\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. Unless you\nmanually uninstalled the standard kernel metapackages (e.g. linux-generic,\nlinux-server, linux-powerpc), a standard system upgrade will automatically\nperform this as well. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n _______________________________________________________________________\n\n Mandriva Linux Security Advisory MDVSA-2014:155\n http://www.mandriva.com/en/support/security/\n _______________________________________________________________________\n\n Package : kernel\n Date : August 7, 2014\n Affected: Business Server 1.0\n _______________________________________________________________________\n\n Problem Description:\n\n Multiple vulnerabilities has been found and corrected in the Linux\n kernel:\n \n Multiple buffer overflows in drivers/staging/wlags49_h2/wl_priv.c\n in the Linux kernel before 3.12 allow local users to cause a\n denial of service or possibly have unspecified other impact\n by leveraging the CAP_NET_ADMIN capability and providing a long\n station-name string, related to the (1) wvlan_uil_put_info and (2)\n wvlan_set_station_nickname functions (CVE-2013-4514). \n \n The Linux kernel before 3.15.4 on Intel processors does not properly\n restrict use of a non-canonical value for the saved RIP address in\n the case of a system call that does not use IRET, which allows local\n users to leverage a race condition and gain privileges, or cause\n a denial of service (double fault), via a crafted application that\n makes ptrace and fork system calls (CVE-2014-4699). The verification\n of md5 checksums and GPG signatures is performed automatically for you. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/en/support/security/advisories/\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.12 (GNU/Linux)\n\niD8DBQFT4yfXmqjQ0CJFipgRAuk5AKDbuUKogDrhb4iKIs1yOP4IQdpAcwCgodf8\nOMQTfJFCDxSAMSI8iUevOkc=\n=mxBf\n-----END PGP SIGNATURE-----\n. (CVE-2014-4943)\n\nMichael S. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: kernel security and bug fix update\nAdvisory ID: RHSA-2014:1971-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2014-1971.html\nIssue date: 2014-12-09\nCVE Names: CVE-2013-2929 CVE-2014-1739 CVE-2014-3181 \n CVE-2014-3182 CVE-2014-3184 CVE-2014-3185 \n CVE-2014-3186 CVE-2014-3631 CVE-2014-3673 \n CVE-2014-3687 CVE-2014-3688 CVE-2014-4027 \n CVE-2014-4652 CVE-2014-4654 CVE-2014-4655 \n CVE-2014-4656 CVE-2014-5045 CVE-2014-6410 \n=====================================================================\n\n1. Summary:\n\nUpdated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having Important security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section. \n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Server (v. 7) - noarch, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64\n\n3. Description:\n\n* A flaw was found in the way the Linux kernel\u0027s SCTP implementation\nhandled malformed or duplicate Address Configuration Change Chunks\n(ASCONF). A remote attacker could use either of these flaws to crash the\nsystem. (CVE-2014-3673, CVE-2014-3687, Important)\n\n* A flaw was found in the way the Linux kernel\u0027s SCTP implementation\nhandled the association\u0027s output queue. A remote attacker could send\nspecially crafted packets that would cause the system to use an excessive\namount of memory, leading to a denial of service. (CVE-2014-3688,\nImportant)\n\n* Two flaws were found in the way the Apple Magic Mouse/Trackpad\nmulti-touch driver and the Minibox PicoLCD driver handled invalid HID\nreports. An attacker with physical access to the system could use these\nflaws to crash the system or, potentially, escalate their privileges on the\nsystem. (CVE-2014-3181, CVE-2014-3186, Moderate)\n\n* A memory corruption flaw was found in the way the USB ConnectTech\nWhiteHEAT serial driver processed completion commands sent via USB Request\nBlocks buffers. An attacker with physical access to the system could use\nthis flaw to crash the system or, potentially, escalate their privileges on\nthe system. (CVE-2014-3185, Moderate)\n\n* A flaw was found in the way the Linux kernel\u0027s keys subsystem handled the\ntermination condition in the associative array garbage collection\nfunctionality. A local, unprivileged user could use this flaw to crash the\nsystem. (CVE-2014-3631, Moderate)\n\n* Multiple flaws were found in the way the Linux kernel\u0027s ALSA\nimplementation handled user controls. A local, privileged user could use\neither of these flaws to crash the system. (CVE-2014-4654, CVE-2014-4655,\nCVE-2014-4656, Moderate)\n\n* A flaw was found in the way the Linux kernel\u0027s VFS subsystem handled\nreference counting when performing unmount operations on symbolic links. \nA local, unprivileged user could use this flaw to exhaust all available\nmemory on the system or, potentially, trigger a use-after-free error,\nresulting in a system crash or privilege escalation. (CVE-2014-5045,\nModerate)\n\n* A flaw was found in the way the get_dumpable() function return value was\ninterpreted in the ptrace subsystem of the Linux kernel. When\n\u0027fs.suid_dumpable\u0027 was set to 2, a local, unprivileged local user could\nuse this flaw to bypass intended ptrace restrictions and obtain\npotentially sensitive information. (CVE-2013-2929, Low)\n\n* A stack overflow flaw caused by infinite recursion was found in the way\nthe Linux kernel\u0027s UDF file system implementation processed indirect ICBs. \nAn attacker with physical access to the system could use a specially\ncrafted UDF image to crash the system. (CVE-2014-1739,\nLow)\n\n* An out-of-bounds read flaw in the Logitech Unifying receiver driver could\nallow an attacker with physical access to the system to crash the system\nor, potentially, escalate their privileges on the system. (CVE-2014-3182,\nLow)\n\n* Multiple out-of-bounds write flaws were found in the way the Cherry\nCymotion keyboard driver, KYE/Genius device drivers, Logitech device\ndrivers, Monterey Genius KB29E keyboard driver, Petalynx Maxter remote\ncontrol driver, and Sunplus wireless desktop driver handled invalid HID\nreports. An attacker with physical access to the system could use either of\nthese flaws to write data past an allocated memory buffer. (CVE-2014-3184,\nLow)\n\n* An information leak flaw was found in the RAM Disks Memory Copy (rd_mcp)\nback end driver of the iSCSI Target subsystem could allow a privileged user\nto leak the contents of kernel memory to an iSCSI initiator remote client. \n(CVE-2014-4652, Low)\n\n4. Solution:\n\nRed Hat would like to thank Frey Alfredsson for reporting CVE-2014-3631,\nand Vasily Averin of Parallels for reporting CVE-2014-5045. The\nCVE-2014-3673 was discovered by Liu Wei of Red Hat. \n\nAll kernel users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. The system must be\nrebooted for this update to take effect. \n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not use\n\"rpm -Uvh\" as that will remove the running kernel binaries from your\nsystem. You may use \"rpm -e\" to remove old kernels after determining that\nthe new kernel functions properly on your system. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1028148 - CVE-2013-2929 kernel: exec/ptrace: get_dumpable() incorrect tests\n1108744 - CVE-2014-4027 Kernel: target/rd: imformation leakage\n1109774 - CVE-2014-1739 Kernel: drivers: media: an information leakage\n1113406 - CVE-2014-4652 Kernel: ALSA: control: protect user controls against races \u0026 memory disclosure\n1113445 - CVE-2014-4654 CVE-2014-4655 Kernel: ALSA: control: use-after-free in replacing user controls\n1113470 - CVE-2014-4656 Kernel: ALSA: control: integer overflow in id.index \u0026 id.numid\n1122472 - CVE-2014-5045 kernel: vfs: refcount issues during unmount on symlink\n1140325 - CVE-2014-3631 kernel: keys: incorrect termination condition in assoc array garbage collection\n1141173 - CVE-2014-3181 Kernel: HID: OOB write in magicmouse driver\n1141210 - CVE-2014-3182 Kernel: HID: logitech-dj OOB array access\n1141391 - CVE-2014-3184 Kernel: HID: off by one error in various _report_fixup routines\n1141400 - CVE-2014-3185 Kernel: USB serial: memory corruption flaw\n1141407 - CVE-2014-3186 Kernel: HID: memory corruption via OOB write\n1141809 - CVE-2014-6410 kernel: udf: Avoid infinite loop when processing indirect ICBs\n1147850 - CVE-2014-3673 kernel: sctp: skb_over_panic when receiving malformed ASCONF chunks\n1155731 - CVE-2014-3687 kernel: net: sctp: fix panic on duplicate ASCONF chunks\n1155745 - CVE-2014-3688 kernel: net: sctp: remote memory pressure from excessive queueing\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nkernel-3.10.0-123.13.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-123.13.1.el7.noarch.rpm\n\nx86_64:\nkernel-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-debug-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-devel-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-headers-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-tools-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-123.13.1.el7.x86_64.rpm\nperf-3.10.0-123.13.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nnoarch:\nkernel-doc-3.10.0-123.13.1.el7.noarch.rpm\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-123.13.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\npython-perf-3.10.0-123.13.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nkernel-3.10.0-123.13.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-123.13.1.el7.noarch.rpm\n\nx86_64:\nkernel-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-debug-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-devel-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-headers-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-tools-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-123.13.1.el7.x86_64.rpm\nperf-3.10.0-123.13.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nnoarch:\nkernel-doc-3.10.0-123.13.1.el7.noarch.rpm\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-123.13.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\npython-perf-3.10.0-123.13.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nkernel-3.10.0-123.13.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-123.13.1.el7.noarch.rpm\n\nppc64:\nkernel-3.10.0-123.13.1.el7.ppc64.rpm\nkernel-bootwrapper-3.10.0-123.13.1.el7.ppc64.rpm\nkernel-debug-3.10.0-123.13.1.el7.ppc64.rpm\nkernel-debug-debuginfo-3.10.0-123.13.1.el7.ppc64.rpm\nkernel-debug-devel-3.10.0-123.13.1.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-123.13.1.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-123.13.1.el7.ppc64.rpm\nkernel-devel-3.10.0-123.13.1.el7.ppc64.rpm\nkernel-headers-3.10.0-123.13.1.el7.ppc64.rpm\nkernel-tools-3.10.0-123.13.1.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-123.13.1.el7.ppc64.rpm\nkernel-tools-libs-3.10.0-123.13.1.el7.ppc64.rpm\nperf-3.10.0-123.13.1.el7.ppc64.rpm\nperf-debuginfo-3.10.0-123.13.1.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-123.13.1.el7.ppc64.rpm\n\ns390x:\nkernel-3.10.0-123.13.1.el7.s390x.rpm\nkernel-debug-3.10.0-123.13.1.el7.s390x.rpm\nkernel-debug-debuginfo-3.10.0-123.13.1.el7.s390x.rpm\nkernel-debug-devel-3.10.0-123.13.1.el7.s390x.rpm\nkernel-debuginfo-3.10.0-123.13.1.el7.s390x.rpm\nkernel-debuginfo-common-s390x-3.10.0-123.13.1.el7.s390x.rpm\nkernel-devel-3.10.0-123.13.1.el7.s390x.rpm\nkernel-headers-3.10.0-123.13.1.el7.s390x.rpm\nkernel-kdump-3.10.0-123.13.1.el7.s390x.rpm\nkernel-kdump-debuginfo-3.10.0-123.13.1.el7.s390x.rpm\nkernel-kdump-devel-3.10.0-123.13.1.el7.s390x.rpm\nperf-3.10.0-123.13.1.el7.s390x.rpm\nperf-debuginfo-3.10.0-123.13.1.el7.s390x.rpm\npython-perf-debuginfo-3.10.0-123.13.1.el7.s390x.rpm\n\nx86_64:\nkernel-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-debug-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-devel-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-headers-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-tools-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-123.13.1.el7.x86_64.rpm\nperf-3.10.0-123.13.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nnoarch:\nkernel-doc-3.10.0-123.13.1.el7.noarch.rpm\n\nppc64:\nkernel-debug-debuginfo-3.10.0-123.13.1.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-123.13.1.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-123.13.1.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-123.13.1.el7.ppc64.rpm\nkernel-tools-libs-devel-3.10.0-123.13.1.el7.ppc64.rpm\nperf-debuginfo-3.10.0-123.13.1.el7.ppc64.rpm\npython-perf-3.10.0-123.13.1.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-123.13.1.el7.ppc64.rpm\n\ns390x:\nkernel-debug-debuginfo-3.10.0-123.13.1.el7.s390x.rpm\nkernel-debuginfo-3.10.0-123.13.1.el7.s390x.rpm\nkernel-debuginfo-common-s390x-3.10.0-123.13.1.el7.s390x.rpm\nkernel-kdump-debuginfo-3.10.0-123.13.1.el7.s390x.rpm\nperf-debuginfo-3.10.0-123.13.1.el7.s390x.rpm\npython-perf-3.10.0-123.13.1.el7.s390x.rpm\npython-perf-debuginfo-3.10.0-123.13.1.el7.s390x.rpm\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-123.13.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\npython-perf-3.10.0-123.13.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nkernel-3.10.0-123.13.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-123.13.1.el7.noarch.rpm\n\nx86_64:\nkernel-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-debug-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-devel-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-headers-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-tools-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-123.13.1.el7.x86_64.rpm\nperf-3.10.0-123.13.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nnoarch:\nkernel-doc-3.10.0-123.13.1.el7.noarch.rpm\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-123.13.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\npython-perf-3.10.0-123.13.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-123.13.1.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2013-2929\nhttps://access.redhat.com/security/cve/CVE-2014-1739\nhttps://access.redhat.com/security/cve/CVE-2014-3181\nhttps://access.redhat.com/security/cve/CVE-2014-3182\nhttps://access.redhat.com/security/cve/CVE-2014-3184\nhttps://access.redhat.com/security/cve/CVE-2014-3185\nhttps://access.redhat.com/security/cve/CVE-2014-3186\nhttps://access.redhat.com/security/cve/CVE-2014-3631\nhttps://access.redhat.com/security/cve/CVE-2014-3673\nhttps://access.redhat.com/security/cve/CVE-2014-3687\nhttps://access.redhat.com/security/cve/CVE-2014-3688\nhttps://access.redhat.com/security/cve/CVE-2014-4027\nhttps://access.redhat.com/security/cve/CVE-2014-4652\nhttps://access.redhat.com/security/cve/CVE-2014-4654\nhttps://access.redhat.com/security/cve/CVE-2014-4655\nhttps://access.redhat.com/security/cve/CVE-2014-4656\nhttps://access.redhat.com/security/cve/CVE-2014-5045\nhttps://access.redhat.com/security/cve/CVE-2014-6410\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2014 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFUh2CJXlSAg2UNWIIRArzSAJ95AhqaUI998VyNBJGQaTXfSHeJuQCdFjTp\n6IsJOT0XYi+TiyneMDOm9f4=\n=a0Ai\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. Relevant releases/architectures:\n\nMRG Realtime for RHEL 6 Server v.2 - noarch, x86_64\n\n3. (CVE-2014-3153, Important)\n\n* It was found that the Linux kernel\u0027s ptrace subsystem allowed a traced\nprocess\u0027 instruction pointer to be set to a non-canonical memory address\nwithout forcing the non-sysret code path when returning to user space. (CVE-2014-4699,\nImportant)\n\nNote: The CVE-2014-4699 issue only affected systems using an Intel CPU. \n\n* It was found that the permission checks performed by the Linux kernel\nwhen a netlink message was received were not sufficient. (CVE-2014-0181, Moderate)\n\n* It was found that the aio_read_events_ring() function of the Linux\nkernel\u0027s Asynchronous I/O (AIO) subsystem did not properly sanitize the AIO\nring head received from user space. (CVE-2014-0206, Moderate)\n\n* An out-of-bounds memory access flaw was found in the Netlink Attribute\nextension of the Berkeley Packet Filter (BPF) interpreter functionality in\nthe Linux kernel\u0027s networking implementation. Google acknowledges Pinkie Pie as the original\nreporter of CVE-2014-3153. Bugs fixed (https://bugzilla.redhat.com/):\n\n1094265 - CVE-2014-0181 kernel: net: insufficient permision checks of netlink messages\n1094602 - CVE-2014-0206 kernel: aio: insufficient sanitization of head in aio_read_events_ring()\n1096775 - CVE-2014-3144 CVE-2014-3145 Kernel: filter: prevent nla extensions to peek beyond the end of the message\n1102571 - CVE-2014-3917 kernel: DoS with syscall auditing\n1103626 - CVE-2014-3153 kernel: futex: pi futexes requeue issue\n1104097 - CVE-2014-3940 Kernel: missing check during hugepage migration\n1108744 - CVE-2014-4027 Kernel: target/rd: imformation leakage\n1113967 - CVE-2014-4667 kernel: sctp: sk_ack_backlog wrap-around problem\n1115927 - CVE-2014-4699 kernel: x86_64: ptrace: sysret to non-canonical address\n\n6", "sources": [ { "db": "NVD", "id": "CVE-2014-4027" }, { "db": "JVNDB", "id": "JVNDB-2014-003017" }, { "db": "VULHUB", "id": "VHN-71967" }, { "db": "PACKETSTORM", "id": "128090" }, { "db": "PACKETSTORM", "id": "127788" }, { "db": "PACKETSTORM", "id": "128089" }, { "db": "PACKETSTORM", "id": "127515" }, { "db": "PACKETSTORM", "id": "129430" }, { "db": "PACKETSTORM", "id": "127555" }, { "db": "PACKETSTORM", "id": "128091" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-4027", "trust": 3.2 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2014/06/11/1", "trust": 1.7 }, { "db": "SECUNIA", "id": "60564", "trust": 1.1 }, { "db": "SECUNIA", "id": "59777", "trust": 1.1 }, { "db": "SECUNIA", "id": "61310", "trust": 1.1 }, { "db": "SECUNIA", "id": "59134", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2014-003017", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201406-527", "trust": 0.7 }, { "db": "BID", "id": "68159", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-71967", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128090", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "127788", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128089", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "127515", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "129430", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "127555", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128091", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-71967" }, { "db": "JVNDB", "id": "JVNDB-2014-003017" }, { "db": "PACKETSTORM", "id": "128090" }, { "db": "PACKETSTORM", "id": "127788" }, { "db": "PACKETSTORM", "id": "128089" }, { "db": "PACKETSTORM", "id": "127515" }, { "db": "PACKETSTORM", "id": "129430" }, { "db": "PACKETSTORM", "id": "127555" }, { "db": "PACKETSTORM", "id": "128091" }, { "db": "CNNVD", "id": "CNNVD-201406-527" }, { "db": "NVD", "id": "CVE-2014-4027" } ] }, "id": "VAR-201406-0230", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-71967" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T21:56:56.921000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "target/rd: Refactor rd_build_device_space + rd_release_device_space", "trust": 0.8, "url": "https://github.com/torvalds/linux/commit/4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc" }, { "title": "[PATCH] target: Explicitly clear ramdisk_mcp backend pages", "trust": 0.8, "url": "http://permalink.gmane.org/gmane.linux.scsi.target.devel/6618" }, { "title": "Linux Kernel Archives", "trust": 0.8, "url": "http://www.kernel.org" }, { "title": "target/rd: Refactor rd_build_device_space + rd_release_device_space", "trust": 0.8, "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc" }, { "title": "Bug 1108744", "trust": 0.8, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108744" }, { "title": "sol15685: Linux kernel vulnerabilities CVE-2014-3940 and CVE-2014-4027", "trust": 0.8, "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15685.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-003017" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.1 }, { "problemtype": "CWE-264", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-71967" }, { "db": "JVNDB", "id": "JVNDB-2014-003017" }, { "db": "NVD", "id": "CVE-2014-4027" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108744" }, { "trust": 1.7, "url": "https://github.com/torvalds/linux/commit/4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc" }, { "trust": 1.7, "url": "http://www.openwall.com/lists/oss-security/2014/06/11/1" }, { "trust": 1.7, "url": "http://permalink.gmane.org/gmane.linux.scsi.target.devel/6618" }, { "trust": 1.2, "url": "http://www.ubuntu.com/usn/usn-2335-1" }, { "trust": 1.1, "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15685.html" }, { "trust": 1.1, "url": "http://secunia.com/advisories/59134" }, { "trust": 1.1, "url": "http://secunia.com/advisories/59777" }, { "trust": 1.1, "url": "http://secunia.com/advisories/60564" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61310" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" }, { "trust": 1.1, "url": "http://www.ubuntu.com/usn/usn-2334-1" }, { "trust": 1.0, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3ba=commit%3bh=4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4027" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-4027" }, { "trust": 0.7, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-4027" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-4655" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-4656" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-4652" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-4654" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-4667" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-4653" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-4171" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0206" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0181" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-4014" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-5045" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3917" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0155" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-4508" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-4608" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0131" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-4699" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-4943" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1739" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.2, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.2, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "http://www.ubuntu.com/usn/usn-2336-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-lts-trusty/3.13.0-35.62~precise1" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4514" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4943" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4655" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4653" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4514" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4654" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4608" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/advisories/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4652" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4699" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0131" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4656" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4667" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-ti-omap4/3.2.0-1452.72" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-5077" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-lts-quantal/3.5.0-54.81~precise1" }, { "trust": 0.1, "url": "http://www.ubuntu.com/usn/usn-2285-1" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-1739" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3181" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2929" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3673" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3184" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-4027" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-4652" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-3688" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3688" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3185" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3182" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-4656" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3186" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-6410" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2013-2929" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-4654" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3631" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-3631" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-5045" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-3181" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3687" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-3182" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2014-1971.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-3186" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-3185" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-4655" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-3184" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-3673" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-6410" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-3687" }, { "trust": 0.1, "url": "https://access.redhat.com/site/articles/11258" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-3144.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3144" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-3153.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-0206.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3153" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3940" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2014-0913.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-3145.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-3940.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-0181.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-4027.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-3917.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-4667.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-4699.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3145" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/3.13.0-35.62" }, { "trust": 0.1, "url": "http://www.ubuntu.com/usn/usn-2337-1" } ], "sources": [ { "db": "VULHUB", "id": "VHN-71967" }, { "db": "JVNDB", "id": "JVNDB-2014-003017" }, { "db": "PACKETSTORM", "id": "128090" }, { "db": "PACKETSTORM", "id": "127788" }, { "db": "PACKETSTORM", "id": "128089" }, { "db": "PACKETSTORM", "id": "127515" }, { "db": "PACKETSTORM", "id": "129430" }, { "db": "PACKETSTORM", "id": "127555" }, { "db": "PACKETSTORM", "id": "128091" }, { "db": "CNNVD", "id": "CNNVD-201406-527" }, { "db": "NVD", "id": "CVE-2014-4027" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-71967" }, { "db": "JVNDB", "id": "JVNDB-2014-003017" }, { "db": "PACKETSTORM", "id": "128090" }, { "db": "PACKETSTORM", "id": "127788" }, { "db": "PACKETSTORM", "id": "128089" }, { "db": "PACKETSTORM", "id": "127515" }, { "db": "PACKETSTORM", "id": "129430" }, { "db": "PACKETSTORM", "id": "127555" }, { "db": "PACKETSTORM", "id": "128091" }, { "db": "CNNVD", "id": "CNNVD-201406-527" }, { "db": "NVD", "id": "CVE-2014-4027" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-06-23T00:00:00", "db": "VULHUB", "id": "VHN-71967" }, { "date": "2014-06-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-003017" }, { "date": "2014-09-02T20:21:38", "db": "PACKETSTORM", "id": "128090" }, { "date": "2014-08-08T21:42:49", "db": "PACKETSTORM", "id": "127788" }, { "date": "2014-09-02T20:21:27", "db": "PACKETSTORM", "id": "128089" }, { "date": "2014-07-17T21:46:58", "db": "PACKETSTORM", "id": "127515" }, { "date": "2014-12-09T23:13:52", "db": "PACKETSTORM", "id": "129430" }, { "date": "2014-07-22T23:12:07", "db": "PACKETSTORM", "id": "127555" }, { "date": "2014-09-02T20:21:47", "db": "PACKETSTORM", "id": "128091" }, { "date": "2014-06-24T00:00:00", "db": "CNNVD", "id": "CNNVD-201406-527" }, { "date": "2014-06-23T11:21:18.700000", "db": "NVD", "id": "CVE-2014-4027" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-21T00:00:00", "db": "VULHUB", "id": "VHN-71967" }, { "date": "2014-11-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-003017" }, { "date": "2014-06-24T00:00:00", "db": "CNNVD", "id": "CNNVD-201406-527" }, { "date": "2023-11-07T02:20:22.100000", "db": "NVD", "id": "CVE-2014-4027" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "specific network environment", "sources": [ { "db": "CNNVD", "id": "CNNVD-201406-527" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Linux kernel of drivers/target/target_core_rd.c Inside rd_build_device_space Vulnerabilities that capture important information in functions", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-003017" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201406-527" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.