ID CVE-2014-2706 Type cve Reporter cve@mitre.org Modified 2020-08-19T19:40:00
Description
Race condition in the mac80211 subsystem in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via network traffic that improperly interacts with the WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and tx.c.
{"seebug": [{"lastseen": "2017-11-19T17:28:38", "description": "Bugtraq ID:66591\r\nCVE ID:CVE-2014-2706\r\n\r\nLinux Kernel\u662f\u4e00\u6b3e\u5f00\u6e90\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\n\u652f\u6301Generic IEEE 802.11\u7f51\u7edc\u6808\u7684Linux Kernel 'mac80211/sta_info.c'\u5728\u5904\u7406TX\u8def\u5f84\u548cSTA\u5524\u9192\u5b58\u5728\u7ade\u4e89\u6761\u4ef6\u6f0f\u6d1e\uff0c\u5141\u8bb8\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u8fdb\u884c\u62d2\u7edd\u670d\u52a1\u653b\u51fb\uff0c\u4f7f\u5185\u6838\u5d29\u6e83\u3002\n0\nLinux Kernel\n\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8bf7\u4e0b\u8f7d\u4f7f\u7528\uff1a\r\nhttp://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1d147bfa64293b2723c4fec50922168658e613ba", "published": "2014-04-08T00:00:00", "title": "Linux Kernel 'mac80211/sta_info.c'\u7a7a\u6307\u9488\u5f15\u7528\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e", "type": "seebug", "bulletinFamily": "exploit", "cvelist": ["CVE-2014-2706"], "modified": "2014-04-08T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-62080", "id": "SSV:62080", "sourceData": "", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "sourceHref": ""}], "openvas": [{"lastseen": "2019-05-29T18:36:38", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3145", "CVE-2014-3144", "CVE-2014-2706"], "description": "Oracle Linux Local Security Checks ELSA-2014-3052", "modified": "2018-09-28T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310123348", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123348", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2014-3052", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2014-3052.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123348\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:02:35 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2014-3052\");\n script_tag(name:\"insight\", value:\"ELSA-2014-3052 - unbreakable enterprise kernel security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2014-3052\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2014-3052.html\");\n script_cve_id(\"CVE-2014-3144\", \"CVE-2014-3145\", \"CVE-2014-2706\");\n script_tag(name:\"cvss_base\", value:\"7.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux(7|6)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux7\")\n{\n if ((res = isrpmvuln(pkg:\"dtrace-modules\", rpm:\"dtrace-modules~3.8.13~35.3.3.el7uek~0.4.3~4.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek\", rpm:\"kernel-uek~3.8.13~35.3.3.el7uek\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-debug\", rpm:\"kernel-uek-debug~3.8.13~35.3.3.el7uek\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-debug-devel\", rpm:\"kernel-uek-debug-devel~3.8.13~35.3.3.el7uek\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-devel\", rpm:\"kernel-uek-devel~3.8.13~35.3.3.el7uek\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-doc\", rpm:\"kernel-uek-doc~3.8.13~35.3.3.el7uek\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-firmware\", rpm:\"kernel-uek-firmware~3.8.13~35.3.3.el7uek\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"dtrace-modules\", rpm:\"dtrace-modules~3.8.13~35.3.3.el6uek~0.4.3~4.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek\", rpm:\"kernel-uek~3.8.13~35.3.3.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-debug\", rpm:\"kernel-uek-debug~3.8.13~35.3.3.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-debug-devel\", rpm:\"kernel-uek-debug-devel~3.8.13~35.3.3.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-devel\", rpm:\"kernel-uek-devel~3.8.13~35.3.3.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-doc\", rpm:\"kernel-uek-doc~3.8.13~35.3.3.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-firmware\", rpm:\"kernel-uek-firmware~3.8.13~35.3.3.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:37:11", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-2672", "CVE-2014-3534", "CVE-2014-2673", "CVE-2014-0181", "CVE-2014-4667", "CVE-2014-2706"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2014-09-10T00:00:00", "id": "OPENVAS:1361412562310882004", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310882004", "type": "openvas", "title": "CentOS Update for kernel CESA-2014:1023 centos7", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for kernel CESA-2014:1023 centos7\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.882004\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-09-10 06:19:51 +0200 (Wed, 10 Sep 2014)\");\n script_cve_id(\"CVE-2014-0181\", \"CVE-2014-2672\", \"CVE-2014-2673\", \"CVE-2014-2706\",\n \"CVE-2014-3534\", \"CVE-2014-4667\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"CentOS Update for kernel CESA-2014:1023 centos7\");\n script_tag(name:\"insight\", value:\"The kernel packages contain the Linux\nkernel, the core of any Linux operating system.\n\n * It was found that Linux kernel's ptrace subsystem did not properly\nsanitize the address-space-control bits when the program-status word (PSW)\nwas being set. On IBM S/390 systems, a local, unprivileged user could use\nthis flaw to set address-space-control bits to the kernel space, and thus\ngain read and write access to kernel memory. (CVE-2014-3534, Important)\n\n * It was found that the permission checks performed by the Linux kernel\nwhen a netlink message was received were not sufficient. A local,\nunprivileged user could potentially bypass these restrictions by passing a\nnetlink socket as stdout or stderr to a more privileged process and\naltering the output of this process. (CVE-2014-0181, Moderate)\n\n * It was found that a remote attacker could use a race condition flaw in\nthe ath_tx_aggr_sleep() function to crash the system by creating large\nnetwork traffic on the system's Atheros 9k wireless network adapter.\n(CVE-2014-2672, Moderate)\n\n * A flaw was found in the way the Linux kernel performed forking inside of\na transaction. A local, unprivileged user on a PowerPC system that supports\ntransactional memory could use this flaw to crash the system.\n(CVE-2014-2673, Moderate)\n\n * A race condition flaw was found in the way the Linux kernel's mac80211\nsubsystem implementation handled synchronization between TX and STA wake-up\ncode paths. A remote attacker could use this flaw to crash the system.\n(CVE-2014-2706, Moderate)\n\n * An integer underflow flaw was found in the way the Linux kernel's Stream\nControl Transmission Protocol (SCTP) implementation processed certain\nCOOKIE_ECHO packets. By sending a specially crafted SCTP packet, a remote\nattacker could use this flaw to prevent legitimate connections to a\nparticular SCTP server socket to be made. (CVE-2014-4667, Moderate)\n\nRed Hat would like to thank Martin Schwidefsky of IBM for reporting\nCVE-2014-3534, Andy Lutomirski for reporting CVE-2014-0181, and Gopal Reddy\nKodudula of Nokia Siemens Networks for reporting CVE-2014-4667.\n\nThis update also fixes the following bugs:\n\n * Due to a NULL pointer dereference bug in the IPIP and SIT tunneling code,\na kernel panic could be triggered when using IPIP or SIT tunnels with\nIPsec. This update restructures the related code to avoid a NULL pointer\ndereference and the kernel no longer panics when using IPIP or SIT tunnels\nwith IPsec. (BZ#1114957)\n\n * Previously, an IBM POWER8 system could terminate unexpectedly when the\nkernel received an IRQ while handling a transactional memory re-checkpoint\ncritical section. This update ensures that ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"affected\", value:\"kernel on CentOS 7\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"CESA\", value:\"2014:1023\");\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2014-August/020475.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS7\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS7\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~3.10.0~123.6.3.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-abi-whitelists\", rpm:\"kernel-abi-whitelists~3.10.0~123.6.3.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~3.10.0~123.6.3.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~3.10.0~123.6.3.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~3.10.0~123.6.3.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~3.10.0~123.6.3.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~3.10.0~123.6.3.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-tools\", rpm:\"kernel-tools~3.10.0~123.6.3.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-tools-libs\", rpm:\"kernel-tools-libs~3.10.0~123.6.3.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-tools-libs-devel\", rpm:\"kernel-tools-libs-devel~3.10.0~123.6.3.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perf\", rpm:\"perf~3.10.0~123.6.3.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~3.10.0~123.6.3.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:42", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-2672", "CVE-2014-3534", "CVE-2014-2673", "CVE-2014-0181", "CVE-2014-4667", "CVE-2014-2706"], "description": "Oracle Linux Local Security Checks ELSA-2014-1023", "modified": "2018-09-28T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310123341", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123341", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2014-1023", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2014-1023.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123341\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:02:30 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2014-1023\");\n script_tag(name:\"insight\", value:\"ELSA-2014-1023 - kernel security and bug fix update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2014-1023\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2014-1023.html\");\n script_cve_id(\"CVE-2014-2672\", \"CVE-2014-2706\", \"CVE-2014-0181\", \"CVE-2014-2673\", \"CVE-2014-3534\", \"CVE-2014-4667\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux7\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux7\")\n{\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~3.10.0~123.6.3.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-abi-whitelists\", rpm:\"kernel-abi-whitelists~3.10.0~123.6.3.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~3.10.0~123.6.3.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~3.10.0~123.6.3.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~3.10.0~123.6.3.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~3.10.0~123.6.3.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~3.10.0~123.6.3.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-tools\", rpm:\"kernel-tools~3.10.0~123.6.3.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-tools-libs\", rpm:\"kernel-tools-libs~3.10.0~123.6.3.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-tools-libs-devel\", rpm:\"kernel-tools-libs-devel~3.10.0~123.6.3.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"perf\", rpm:\"perf~3.10.0~123.6.3.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~3.10.0~123.6.3.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:32", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-2672", "CVE-2014-3534", "CVE-2014-2673", "CVE-2014-0181", "CVE-2014-4667", "CVE-2014-2706"], "description": "The remote host is missing an update for the ", "modified": "2018-11-23T00:00:00", "published": "2014-08-07T00:00:00", "id": "OPENVAS:1361412562310871222", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310871222", "type": "openvas", "title": "RedHat Update for kernel RHSA-2014:1023-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for kernel RHSA-2014:1023-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.871222\");\n script_version(\"$Revision: 12497 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2014-08-07 05:58:40 +0200 (Thu, 07 Aug 2014)\");\n script_cve_id(\"CVE-2014-0181\", \"CVE-2014-2672\", \"CVE-2014-2673\", \"CVE-2014-2706\",\n \"CVE-2014-3534\", \"CVE-2014-4667\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"RedHat Update for kernel RHSA-2014:1023-01\");\n\n\n script_tag(name:\"affected\", value:\"kernel on Red Hat Enterprise Linux Server (v. 7)\");\n script_tag(name:\"insight\", value:\"The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n * It was found that Linux kernel's ptrace subsystem did not properly\nsanitize the address-space-control bits when the program-status word (PSW)\nwas being set. On IBM S/390 systems, a local, unprivileged user could use\nthis flaw to set address-space-control bits to the kernel space, and thus\ngain read and write access to kernel memory. (CVE-2014-3534, Important)\n\n * It was found that the permission checks performed by the Linux kernel\nwhen a netlink message was received were not sufficient. A local,\nunprivileged user could potentially bypass these restrictions by passing a\nnetlink socket as stdout or stderr to a more privileged process and\naltering the output of this process. (CVE-2014-0181, Moderate)\n\n * It was found that a remote attacker could use a race condition flaw in\nthe ath_tx_aggr_sleep() function to crash the system by creating large\nnetwork traffic on the system's Atheros 9k wireless network adapter.\n(CVE-2014-2672, Moderate)\n\n * A flaw was found in the way the Linux kernel performed forking inside of\na transaction. A local, unprivileged user on a PowerPC system that supports\ntransactional memory could use this flaw to crash the system.\n(CVE-2014-2673, Moderate)\n\n * A race condition flaw was found in the way the Linux kernel's mac80211\nsubsystem implementation handled synchronization between TX and STA wake-up\ncode paths. A remote attacker could use this flaw to crash the system.\n(CVE-2014-2706, Moderate)\n\n * An integer underflow flaw was found in the way the Linux kernel's Stream\nControl Transmission Protocol (SCTP) implementation processed certain\nCOOKIE_ECHO packets. By sending a specially crafted SCTP packet, a remote\nattacker could use this flaw to prevent legitimate connections to a\nparticular SCTP server socket to be made. (CVE-2014-4667, Moderate)\n\nRed Hat would like to thank Martin Schwidefsky of IBM for reporting\nCVE-2014-3534, Andy Lutomirski for reporting CVE-2014-0181, and Gopal Reddy\nKodudula of Nokia Siemens Networks for reporting CVE-2014-4667.\n\nThis update also fixes the following bugs:\n\n * Due to a NULL pointer dereference bug in the IPIP and SIT tunneling code,\na kernel panic could be triggered when using IPIP or SIT tunnels with\nIPsec. This update restructures the related code to avoid a NULL pointer\ndereference and the kernel no longer panics when using IPIP or SIT tunnels\nwith IPsec. (BZ#1114957)\n\n * Previously, an IBM POWER8 system could terminate unexpectedly when the\nkernel received an IRQ while handling a transactional memory re-checkpoint\ncritical sect ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"RHSA\", value:\"2014:1023-01\");\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2014-August/msg00011.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_7\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_7\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel-abi-whitelists\", rpm:\"kernel-abi-whitelists~3.10.0~123.6.3.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~3.10.0~123.6.3.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~3.10.0~123.6.3.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~3.10.0~123.6.3.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~3.10.0~123.6.3.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~3.10.0~123.6.3.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo-common-x86_64\", rpm:\"kernel-debuginfo-common-x86_64~3.10.0~123.6.3.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~3.10.0~123.6.3.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~3.10.0~123.6.3.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-tools\", rpm:\"kernel-tools~3.10.0~123.6.3.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-tools-debuginfo\", rpm:\"kernel-tools-debuginfo~3.10.0~123.6.3.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-tools-libs\", rpm:\"kernel-tools-libs~3.10.0~123.6.3.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perf\", rpm:\"perf~3.10.0~123.6.3.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perf-debuginfo\", rpm:\"perf-debuginfo~3.10.0~123.6.3.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"python-perf-debuginfo\", rpm:\"python-perf-debuginfo~3.10.0~123.6.3.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:17", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-2672", "CVE-2012-6647", "CVE-2014-3145", "CVE-2013-7339", "CVE-2014-2851", "CVE-2014-2678", "CVE-2014-3144", "CVE-2014-2706"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2014-08-05T00:00:00", "id": "OPENVAS:1361412562310881979", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881979", "type": "openvas", "title": "CentOS Update for kernel CESA-2014:0981 centos6", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for kernel CESA-2014:0981 centos6\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.881979\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-08-05 16:47:39 +0530 (Tue, 05 Aug 2014)\");\n script_cve_id(\"CVE-2012-6647\", \"CVE-2013-7339\", \"CVE-2014-2672\", \"CVE-2014-2678\",\n \"CVE-2014-2706\", \"CVE-2014-2851\", \"CVE-2014-3144\", \"CVE-2014-3145\");\n script_tag(name:\"cvss_base\", value:\"7.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_name(\"CentOS Update for kernel CESA-2014:0981 centos6\");\n\n script_tag(name:\"affected\", value:\"kernel on CentOS 6\");\n script_tag(name:\"insight\", value:\"The kernel packages contain the Linux kernel, the core of any\nLinux operating system.\n\n * A use-after-free flaw was found in the way the ping_init_sock() function\nof the Linux kernel handled the group_info reference counter. A local,\nunprivileged user could use this flaw to crash the system or, potentially,\nescalate their privileges on the system. (CVE-2014-2851, Important)\n\n * A NULL pointer dereference flaw was found in the way the\nfutex_wait_requeue_pi() function of the Linux kernel's futex subsystem\nhandled the requeuing of certain Priority Inheritance (PI) futexes.\nA local, unprivileged user could use this flaw to crash the system.\n(CVE-2012-6647, Moderate)\n\n * A NULL pointer dereference flaw was found in the rds_ib_laddr_check()\nfunction in the Linux kernel's implementation of Reliable Datagram Sockets\n(RDS). A local, unprivileged user could use this flaw to crash the system.\n(CVE-2013-7339, Moderate)\n\n * It was found that a remote attacker could use a race condition flaw in\nthe ath_tx_aggr_sleep() function to crash the system by creating large\nnetwork traffic on the system's Atheros 9k wireless network adapter.\n(CVE-2014-2672, Moderate)\n\n * A NULL pointer dereference flaw was found in the rds_iw_laddr_check()\nfunction in the Linux kernel's implementation of Reliable Datagram Sockets\n(RDS). A local, unprivileged user could use this flaw to crash the system.\n(CVE-2014-2678, Moderate)\n\n * A race condition flaw was found in the way the Linux kernel's mac80211\nsubsystem implementation handled synchronization between TX and STA wake-up\ncode paths. A remote attacker could use this flaw to crash the system.\n(CVE-2014-2706, Moderate)\n\n * An out-of-bounds memory access flaw was found in the Netlink Attribute\nextension of the Berkeley Packet Filter (BPF) interpreter functionality in\nthe Linux kernel's networking implementation. A local, unprivileged user\ncould use this flaw to crash the system or leak kernel memory to user space\nvia a specially crafted socket filter. (CVE-2014-3144, CVE-2014-3145,\nModerate)\n\nThis update also fixes several bugs and adds one enhancement.\nDocumentation for these changes will be available shortly from the\nTechnical Notes document linked to in the References section.\n\nAll kernel users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues and add this\nenhancement. The system must be rebooted for this update to take effect.\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"CESA\", value:\"2014:0981\");\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2014-July/020458.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS6\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.32~431.23.3.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-abi-whitelists\", rpm:\"kernel-abi-whitelists~2.6.32~431.23.3.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.32~431.23.3.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.32~431.23.3.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.32~431.23.3.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.32~431.23.3.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-firmware\", rpm:\"kernel-firmware~2.6.32~431.23.3.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.32~431.23.3.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perf\", rpm:\"perf~2.6.32~431.23.3.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~2.6.32~431.23.3.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:37:15", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-2672", "CVE-2012-6647", "CVE-2014-3145", "CVE-2013-7339", "CVE-2014-2851", "CVE-2014-2678", "CVE-2014-3144", "CVE-2014-2706"], "description": "The remote host is missing an update for the ", "modified": "2018-11-23T00:00:00", "published": "2014-08-05T00:00:00", "id": "OPENVAS:1361412562310871216", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310871216", "type": "openvas", "title": "RedHat Update for kernel RHSA-2014:0981-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for kernel RHSA-2014:0981-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.871216\");\n script_version(\"$Revision: 12497 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2014-08-05 16:51:34 +0530 (Tue, 05 Aug 2014)\");\n script_cve_id(\"CVE-2012-6647\", \"CVE-2013-7339\", \"CVE-2014-2672\", \"CVE-2014-2678\",\n \"CVE-2014-2706\", \"CVE-2014-2851\", \"CVE-2014-3144\", \"CVE-2014-3145\");\n script_tag(name:\"cvss_base\", value:\"7.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_name(\"RedHat Update for kernel RHSA-2014:0981-01\");\n\n\n script_tag(name:\"affected\", value:\"kernel on Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\");\n script_tag(name:\"insight\", value:\"The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n * A use-after-free flaw was found in the way the ping_init_sock() function\nof the Linux kernel handled the group_info reference counter. A local,\nunprivileged user could use this flaw to crash the system or, potentially,\nescalate their privileges on the system. (CVE-2014-2851, Important)\n\n * A NULL pointer dereference flaw was found in the way the\nfutex_wait_requeue_pi() function of the Linux kernel's futex subsystem\nhandled the requeuing of certain Priority Inheritance (PI) futexes.\nA local, unprivileged user could use this flaw to crash the system.\n(CVE-2012-6647, Moderate)\n\n * A NULL pointer dereference flaw was found in the rds_ib_laddr_check()\nfunction in the Linux kernel's implementation of Reliable Datagram Sockets\n(RDS). A local, unprivileged user could use this flaw to crash the system.\n(CVE-2013-7339, Moderate)\n\n * It was found that a remote attacker could use a race condition flaw in\nthe ath_tx_aggr_sleep() function to crash the system by creating large\nnetwork traffic on the system's Atheros 9k wireless network adapter.\n(CVE-2014-2672, Moderate)\n\n * A NULL pointer dereference flaw was found in the rds_iw_laddr_check()\nfunction in the Linux kernel's implementation of Reliable Datagram Sockets\n(RDS). A local, unprivileged user could use this flaw to crash the system.\n(CVE-2014-2678, Moderate)\n\n * A race condition flaw was found in the way the Linux kernel's mac80211\nsubsystem implementation handled synchronization between TX and STA wake-up\ncode paths. A remote attacker could use this flaw to crash the system.\n(CVE-2014-2706, Moderate)\n\n * An out-of-bounds memory access flaw was found in the Netlink Attribute\nextension of the Berkeley Packet Filter (BPF) interpreter functionality in\nthe Linux kernel's networking implementation. A local, unprivileged user\ncould use this flaw to crash the system or leak kernel memory to user space\nvia a specially crafted socket filter. (CVE-2014-3144, CVE-2014-3145,\nModerate)\n\nThis update also fixes several bugs and adds one enhancement.\nDocumentation for these changes will be available shortly from the\nTechnical Notes document linked to in the References section.\n\nAll kernel users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues and add this\nenhancement. The system must be rebooted for this update to take effect.\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"RHSA\", value:\"2014:0981-01\");\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2014-July/msg00060.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_6\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.32~431.23.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.32~431.23.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~2.6.32~431.23.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.32~431.23.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.6.32~431.23.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo-common-i686\", rpm:\"kernel-debuginfo-common-i686~2.6.32~431.23.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.32~431.23.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.32~431.23.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perf\", rpm:\"perf~2.6.32~431.23.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perf-debuginfo\", rpm:\"perf-debuginfo~2.6.32~431.23.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"python-perf-debuginfo\", rpm:\"python-perf-debuginfo~2.6.32~431.23.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-abi-whitelists\", rpm:\"kernel-abi-whitelists~2.6.32~431.23.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.32~431.23.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-firmware\", rpm:\"kernel-firmware~2.6.32~431.23.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo-common-x86_64\", rpm:\"kernel-debuginfo-common-x86_64~2.6.32~431.23.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:36:11", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-2672", "CVE-2012-6647", "CVE-2014-3145", "CVE-2013-7339", "CVE-2014-2851", "CVE-2014-2678", "CVE-2014-3144", "CVE-2014-2706"], "description": "Oracle Linux Local Security Checks ELSA-2014-0981", "modified": "2018-09-28T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310123347", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123347", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2014-0981", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2014-0981.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123347\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:02:35 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2014-0981\");\n script_tag(name:\"insight\", value:\"ELSA-2014-0981 - kernel security, bug fix, and enhancement update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2014-0981\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2014-0981.html\");\n script_cve_id(\"CVE-2014-2851\", \"CVE-2013-7339\", \"CVE-2014-3144\", \"CVE-2014-3145\", \"CVE-2014-2678\", \"CVE-2012-6647\", \"CVE-2014-2672\", \"CVE-2014-2706\");\n script_tag(name:\"cvss_base\", value:\"7.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux6\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.32~431.23.3.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-abi-whitelists\", rpm:\"kernel-abi-whitelists~2.6.32~431.23.3.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.32~431.23.3.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.32~431.23.3.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.32~431.23.3.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.32~431.23.3.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-firmware\", rpm:\"kernel-firmware~2.6.32~431.23.3.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.32~431.23.3.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"perf\", rpm:\"perf~2.6.32~431.23.3.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~2.6.32~431.23.3.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:37:25", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-2672", "CVE-2014-1737", "CVE-2014-1738", "CVE-2014-2851", "CVE-2014-2309", "CVE-2014-2678", "CVE-2013-4483", "CVE-2014-0077", "CVE-2014-2523", "CVE-2014-0101", "CVE-2014-0069", "CVE-2014-2706"], "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2014-06-02T00:00:00", "id": "OPENVAS:1361412562310841840", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310841840", "type": "openvas", "title": "Ubuntu Update for linux USN-2221-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_2221_1.nasl 14140 2019-03-13 12:26:09Z cfischer $\n#\n# Ubuntu Update for linux USN-2221-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.841840\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-06-02 17:17:33 +0530 (Mon, 02 Jun 2014)\");\n script_cve_id(\"CVE-2014-1738\", \"CVE-2014-1737\", \"CVE-2013-4483\", \"CVE-2014-0069\",\n \"CVE-2014-0077\", \"CVE-2014-0101\", \"CVE-2014-2309\", \"CVE-2014-2523\",\n \"CVE-2014-2672\", \"CVE-2014-2678\", \"CVE-2014-2706\", \"CVE-2014-2851\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Ubuntu Update for linux USN-2221-1\");\n\n script_tag(name:\"affected\", value:\"linux on Ubuntu 12.04 LTS\");\n script_tag(name:\"insight\", value:\"Matthew Daley reported an information leak in the floppy disk\ndriver of the Linux kernel. An unprivileged local user could exploit this flaw\nto obtain potentially sensitive information from kernel memory. (CVE-2014-1738)\n\nMatthew Daley reported a flaw in the handling of ioctl commands by the\nfloppy disk driver in the Linux kernel. An unprivileged local user could\nexploit this flaw to gain administrative privileges if the floppy disk\nmodule is loaded. (CVE-2014-1737)\n\nA flaw was discovered in the Linux kernel's IPC reference counting. An\nunprivileged local user could exploit this flaw to cause a denial of\nservice (OOM system crash). (CVE-2013-4483)\n\nAl Viro discovered an error in how CIFS in the Linux kernel handles\nuncached write operations. An unprivileged local user could exploit this\nflaw to cause a denial of service (system crash), obtain sensitive\ninformation from kernel memory, or possibly gain privileges.\n(CVE-2014-0069)\n\nA flaw was discovered in the handling of network packets when mergeable\nbuffers are disabled for virtual machines in the Linux kernel. Guest OS\nusers may exploit this flaw to cause a denial of service (host OS crash) or\npossibly gain privilege on the host OS. (CVE-2014-0077)\n\nA flaw was discovered in the Linux kernel's handling of the SCTP handshake.\nA remote attacker could exploit this flaw to cause a denial of service\n(system crash). (CVE-2014-0101)\n\nA flaw was discovered in the handling of routing information in Linux\nkernel's IPv6 stack. A remote attacker could exploit this flaw to cause a\ndenial of service (memory consumption) via a flood of ICMPv6 router\nadvertisement packets. (CVE-2014-2309)\n\nAn error was discovered in the Linux kernel's DCCP protocol support. A\nremote attacked could exploit this flaw to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2014-2523)\n\nMax Sydorenko discovered a race condition in the Atheros 9k wireless driver\nin the Linux kernel. This race could be exploited by remote attackers to\ncause a denial of service (system crash). (CVE-2014-2672)\n\nAn error was discovered in the Reliable Datagram Sockets (RDS) protocol\nstack in the Linux kernel. A local user could exploit this flaw to cause a\ndenial of service (system crash) or possibly have unspecified other impact.\n(CVE-2014-2678)\n\nYaara Rozenblum discovered a race condition in the Linux kernel's Generic\nIEEE 802.11 Networking Stack (mac80211). Remote attackers could exploit\nthis flaw to cause a denial of service (system crash). (CVE-2014-2706)\n\nA flaw was discovered in the Linux kernel's ping sockets. An unprivileged\nlocal user could exploit this flaw to cause a denial of service (system\ncrash) or possibly gain privileges via a crafted application.\n(CVE-2014-2851)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"USN\", value:\"2221-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2221-1/\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU12\\.04 LTS\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-63-generic\", ver:\"3.2.0-63.95\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-63-generic-pae\", ver:\"3.2.0-63.95\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-63-highbank\", ver:\"3.2.0-63.95\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-63-omap\", ver:\"3.2.0-63.95\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-63-powerpc-smp\", ver:\"3.2.0-63.95\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-63-powerpc64-smp\", ver:\"3.2.0-63.95\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-63-virtual\", ver:\"3.2.0-63.95\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:35", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3122", "CVE-2014-2672", "CVE-2014-1737", "CVE-2014-1738", "CVE-2014-2851", "CVE-2014-2309", "CVE-2014-2678", "CVE-2014-0055", "CVE-2014-0077", "CVE-2014-2523", "CVE-2014-0101", "CVE-2014-2706"], "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2014-06-02T00:00:00", "id": "OPENVAS:1361412562310841836", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310841836", "type": "openvas", "title": "Ubuntu Update for linux-lts-raring USN-2224-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_2224_1.nasl 14140 2019-03-13 12:26:09Z cfischer $\n#\n# Ubuntu Update for linux-lts-raring USN-2224-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.841836\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-06-02 15:44:18 +0530 (Mon, 02 Jun 2014)\");\n script_cve_id(\"CVE-2014-1738\", \"CVE-2014-1737\", \"CVE-2014-0055\", \"CVE-2014-0077\",\n \"CVE-2014-0101\", \"CVE-2014-2309\", \"CVE-2014-2523\", \"CVE-2014-2672\",\n \"CVE-2014-2678\", \"CVE-2014-2706\", \"CVE-2014-2851\", \"CVE-2014-3122\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Ubuntu Update for linux-lts-raring USN-2224-1\");\n\n script_tag(name:\"affected\", value:\"linux-lts-raring on Ubuntu 12.04 LTS\");\n script_tag(name:\"insight\", value:\"Matthew Daley reported an information leak in the floppy disk\ndriver of the Linux kernel. An unprivileged local user could exploit this flaw\nto obtain potentially sensitive information from kernel memory. (CVE-2014-1738)\n\nMatthew Daley reported a flaw in the handling of ioctl commands by the\nfloppy disk driver in the Linux kernel. An unprivileged local user could\nexploit this flaw to gain administrative privileges if the floppy disk\nmodule is loaded. (CVE-2014-1737)\n\nA flaw was discovered in the vhost-net subsystem of the Linux kernel. Guest\nOS users could exploit this flaw to cause a denial of service (host OS\ncrash). (CVE-2014-0055)\n\nA flaw was discovered in the handling of network packets when mergeable\nbuffers are disabled for virtual machines in the Linux kernel. Guest OS\nusers may exploit this flaw to cause a denial of service (host OS crash) or\npossibly gain privilege on the host OS. (CVE-2014-0077)\n\nA flaw was discovered in the Linux kernel's handling of the SCTP handshake.\nA remote attacker could exploit this flaw to cause a denial of service\n(system crash). (CVE-2014-0101)\n\nA flaw was discovered in the handling of routing information in Linux\nkernel's IPv6 stack. A remote attacker could exploit this flaw to cause a\ndenial of service (memory consumption) via a flood of ICMPv6 router\nadvertisement packets. (CVE-2014-2309)\n\nAn error was discovered in the Linux kernel's DCCP protocol support. A\nremote attacked could exploit this flaw to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2014-2523)\n\nMax Sydorenko discovered a race condition in the Atheros 9k wireless driver\nin the Linux kernel. This race could be exploited by remote attackers to\ncause a denial of service (system crash). (CVE-2014-2672)\n\nAn error was discovered in the Reliable Datagram Sockets (RDS) protocol\nstack in the Linux kernel. A local user could exploit this flaw to cause a\ndenial of service (system crash) or possibly have unspecified other impact.\n(CVE-2014-2678)\n\nYaara Rozenblum discovered a race condition in the Linux kernel's Generic\nIEEE 802.11 Networking Stack (mac80211). Remote attackers could exploit\nthis flaw to cause a denial of service (system crash). (CVE-2014-2706)\n\nA flaw was discovered in the Linux kernel's ping sockets. An unprivileged\nlocal user could exploit this flaw to cause a denial of service (system\ncrash) or possibly gain privileges via a crafted application.\n(CVE-2014-2851)\n\nSasha Levin reported a bug in the Linux kernel's virtual memory management\nsubsystem. An unprivileged local user could exploit this flaw to cause a\ndenial of service (system crash). (CVE-2014-3122)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"USN\", value:\"2224-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2224-1/\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux-lts-raring'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU12\\.04 LTS\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.8.0-41-generic\", ver:\"3.8.0-41.60~precise1\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:31", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-2672", "CVE-2014-1737", "CVE-2014-1738", "CVE-2014-0196", "CVE-2014-2851", "CVE-2014-2309", "CVE-2014-2678", "CVE-2013-4483", "CVE-2014-0077", "CVE-2014-2523", "CVE-2014-0101", "CVE-2014-0069", "CVE-2014-2706"], "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2014-06-02T00:00:00", "id": "OPENVAS:1361412562310841839", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310841839", "type": "openvas", "title": "Ubuntu Update for linux-ti-omap4 USN-2227-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_2227_1.nasl 14140 2019-03-13 12:26:09Z cfischer $\n#\n# Ubuntu Update for linux-ti-omap4 USN-2227-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.841839\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-06-02 16:48:50 +0530 (Mon, 02 Jun 2014)\");\n script_cve_id(\"CVE-2014-0196\", \"CVE-2014-1738\", \"CVE-2014-1737\", \"CVE-2013-4483\",\n \"CVE-2014-0069\", \"CVE-2014-0077\", \"CVE-2014-0101\", \"CVE-2014-2309\",\n \"CVE-2014-2523\", \"CVE-2014-2672\", \"CVE-2014-2678\", \"CVE-2014-2706\",\n \"CVE-2014-2851\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Ubuntu Update for linux-ti-omap4 USN-2227-1\");\n\n script_tag(name:\"affected\", value:\"linux-ti-omap4 on Ubuntu 12.04 LTS\");\n script_tag(name:\"insight\", value:\"A flaw was discovered in the Linux kernel's pseudo tty (pty)\ndevice. An unprivileged user could exploit this flaw to cause a denial of\nservice (system crash) or potentially gain administrator privileges.\n(CVE-2014-0196)\n\nMatthew Daley reported an information leak in the floppy disk driver of the\nLinux kernel. An unprivileged local user could exploit this flaw to obtain\npotentially sensitive information from kernel memory. (CVE-2014-1738)\n\nMatthew Daley reported a flaw in the handling of ioctl commands by the\nfloppy disk driver in the Linux kernel. An unprivileged local user could\nexploit this flaw to gain administrative privileges if the floppy disk\nmodule is loaded. (CVE-2014-1737)\n\nA flaw was discovered in the Linux kernel's IPC reference counting. An\nunprivileged local user could exploit this flaw to cause a denial of\nservice (OOM system crash). (CVE-2013-4483)\n\nAl Viro discovered an error in how CIFS in the Linux kernel handles\nuncached write operations. An unprivileged local user could exploit this\nflaw to cause a denial of service (system crash), obtain sensitive\ninformation from kernel memory, or possibly gain privileges.\n(CVE-2014-0069)\n\nA flaw was discovered in the handling of network packets when mergeable\nbuffers are disabled for virtual machines in the Linux kernel. Guest OS\nusers may exploit this flaw to cause a denial of service (host OS crash) or\npossibly gain privilege on the host OS. (CVE-2014-0077)\n\nA flaw was discovered in the Linux kernel's handling of the SCTP handshake.\nA remote attacker could exploit this flaw to cause a denial of service\n(system crash). (CVE-2014-0101)\n\nA flaw was discovered in the handling of routing information in Linux\nkernel's IPv6 stack. A remote attacker could exploit this flaw to cause a\ndenial of service (memory consumption) via a flood of ICMPv6 router\nadvertisement packets. (CVE-2014-2309)\n\nAn error was discovered in the Linux kernel's DCCP protocol support. A\nremote attacked could exploit this flaw to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2014-2523)\n\nMax Sydorenko discovered a race condition in the Atheros 9k wireless driver\nin the Linux kernel. This race could be exploited by remote attackers to\ncause a denial of service (system crash). (CVE-2014-2672)\n\nAn error was discovered in the Reliable Datagram Sockets (RDS) protocol\nstack in the Linux kernel. A local user could exploit this flaw to cause a\ndenial of service (system crash) or possibly have unspecified other impact.\n(CVE-2014-2678)\n\nYaara Rozenblum discovered a race condition in the Linux kernel's Generic\nIEEE 802.11 Networking St ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"USN\", value:\"2227-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2227-1/\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux-ti-omap4'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU12\\.04 LTS\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-1446-omap4\", ver:\"3.2.0-1446.65\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2021-01-17T12:49:32", "description": "Description of changes:\n\nkernel-uek\n[3.8.13-35.3.3.el7uek]\n- filter: prevent nla extensions to peek beyond the end of the message \n(Mathias Krause) [Orabug: 19315781] {CVE-2014-3144} {CVE-2014-3145}\n- mac80211: fix AP powersave TX vs. wakeup race (Emmanuel Grumbach) \n[Orabug: 19316457] {CVE-2014-2706}", "edition": 20, "published": "2014-07-31T00:00:00", "title": "Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2014-3052)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3145", "CVE-2014-3144", "CVE-2014-2706"], "modified": "2014-07-31T00:00:00", "cpe": ["cpe:/o:oracle:linux:6", "p-cpe:/a:oracle:linux:kernel-uek-firmware", "p-cpe:/a:oracle:linux:kernel-uek-doc", "p-cpe:/a:oracle:linux:kernel-uek", "p-cpe:/a:oracle:linux:dtrace-modules-3.8.13-35.3.3.el7uek", "p-cpe:/a:oracle:linux:kernel-uek-debug-devel", "p-cpe:/a:oracle:linux:kernel-uek-devel", "p-cpe:/a:oracle:linux:dtrace-modules-3.8.13-35.3.3.el6uek", "cpe:/o:oracle:linux:7", "p-cpe:/a:oracle:linux:kernel-uek-debug"], "id": "ORACLELINUX_ELSA-2014-3052.NASL", "href": "https://www.tenable.com/plugins/nessus/76926", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisory ELSA-2014-3052.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(76926);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2014-2706\", \"CVE-2014-3144\", \"CVE-2014-3145\");\n script_bugtraq_id(66591, 67309, 67321);\n\n script_name(english:\"Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2014-3052)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Description of changes:\n\nkernel-uek\n[3.8.13-35.3.3.el7uek]\n- filter: prevent nla extensions to peek beyond the end of the message \n(Mathias Krause) [Orabug: 19315781] {CVE-2014-3144} {CVE-2014-3145}\n- mac80211: fix AP powersave TX vs. wakeup race (Emmanuel Grumbach) \n[Orabug: 19316457] {CVE-2014-2706}\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2014-July/004309.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2014-July/004310.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected unbreakable enterprise kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:dtrace-modules-3.8.13-35.3.3.el6uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:dtrace-modules-3.8.13-35.3.3.el7uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/04/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/07/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/07/31\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(6|7)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 6 / 7\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2014-2706\", \"CVE-2014-3144\", \"CVE-2014-3145\"); \n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for ELSA-2014-3052\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nkernel_major_minor = get_kb_item(\"Host/uname/major_minor\");\nif (empty_or_null(kernel_major_minor)) exit(1, \"Unable to determine kernel major-minor level.\");\nexpected_kernel_major_minor = \"3.8\";\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, \"running kernel level \" + expected_kernel_major_minor + \", it is running kernel level \" + kernel_major_minor);\n\nflag = 0;\nif (rpm_check(release:\"EL6\", cpu:\"x86_64\", reference:\"dtrace-modules-3.8.13-35.3.3.el6uek-0.4.3-4.el6\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-uek-3.8.13\") && rpm_check(release:\"EL6\", cpu:\"x86_64\", reference:\"kernel-uek-3.8.13-35.3.3.el6uek\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-uek-debug-3.8.13\") && rpm_check(release:\"EL6\", cpu:\"x86_64\", reference:\"kernel-uek-debug-3.8.13-35.3.3.el6uek\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-uek-debug-devel-3.8.13\") && rpm_check(release:\"EL6\", cpu:\"x86_64\", reference:\"kernel-uek-debug-devel-3.8.13-35.3.3.el6uek\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-uek-devel-3.8.13\") && rpm_check(release:\"EL6\", cpu:\"x86_64\", reference:\"kernel-uek-devel-3.8.13-35.3.3.el6uek\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-uek-doc-3.8.13\") && rpm_check(release:\"EL6\", cpu:\"x86_64\", reference:\"kernel-uek-doc-3.8.13-35.3.3.el6uek\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-uek-firmware-3.8.13\") && rpm_check(release:\"EL6\", cpu:\"x86_64\", reference:\"kernel-uek-firmware-3.8.13-35.3.3.el6uek\")) flag++;\n\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"dtrace-modules-3.8.13-35.3.3.el7uek-0.4.3-4.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-uek-3.8.13\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-uek-3.8.13-35.3.3.el7uek\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-uek-debug-3.8.13\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-uek-debug-3.8.13-35.3.3.el7uek\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-uek-debug-devel-3.8.13\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-uek-debug-devel-3.8.13-35.3.3.el7uek\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-uek-devel-3.8.13\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-uek-devel-3.8.13-35.3.3.el7uek\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-uek-doc-3.8.13\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-uek-doc-3.8.13-35.3.3.el7uek\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-uek-firmware-3.8.13\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-uek-firmware-3.8.13-35.3.3.el7uek\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"affected kernel\");\n}\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T13:14:55", "description": "Updated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 6.4 Extended\nUpdate Support.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A use-after-free flaw was found in the way the ping_init_sock()\nfunction of the Linux kernel handled the group_info reference counter.\nA local, unprivileged user could use this flaw to crash the system or,\npotentially, escalate their privileges on the system. (CVE-2014-2851,\nImportant)\n\n* A NULL pointer dereference flaw was found in the\nrds_ib_laddr_check() function in the Linux kernel's implementation of\nReliable Datagram Sockets (RDS). A local, unprivileged user could use\nthis flaw to crash the system. (CVE-2013-7339, Moderate)\n\n* It was found that a remote attacker could use a race condition flaw\nin the ath_tx_aggr_sleep() function to crash the system by creating\nlarge network traffic on the system's Atheros 9k wireless network\nadapter. (CVE-2014-2672, Moderate)\n\n* A NULL pointer dereference flaw was found in the\nrds_iw_laddr_check() function in the Linux kernel's implementation of\nReliable Datagram Sockets (RDS). A local, unprivileged user could use\nthis flaw to crash the system. (CVE-2014-2678, Moderate)\n\n* A race condition flaw was found in the way the Linux kernel's\nmac80211 subsystem implementation handled synchronization between TX\nand STA wake-up code paths. A remote attacker could use this flaw to\ncrash the system. (CVE-2014-2706, Moderate)\n\nThis update also fixes the following bugs :\n\n* The Completely Fair Scheduler (CFS) did not verify whether the CFS\nperiod timer is running while throttling tasks on the CFS run queue.\nTherefore under certain circumstances, the CFS run queue became stuck\nbecause the CFS period timer was inactive and could not be restarted.\nTo fix this problem, the CFS now restarts the CFS period timer inside\nthe throttling function if it is inactive. (BZ#1120666)\n\n* A previous change to the SCSI code fixed a race condition that could\noccur when removing a SCSI device. However, that change caused\nperformance degradation because it used a certain function from the\nblock layer code that was returning different values compared with\nlater versions of the kernel. This update alters the SCSI code to\nproperly utilize the values returned by the block layer code.\n(BZ#1117581)\n\n* If a statically defined gateway became unreachable and its\ncorresponding neighbor entry entered a FAILED state, the gateway\nstayed in the FAILED state even after it became reachable again. This\nprevented routing of the traffic through that gateway. This update\nallows probing such a gateway automatically and routing the traffic\nthrough the gateway again once it becomes reachable. (BZ#1115262)\n\n* A miscalculation in the 'radix_tree' swap encoding corrupted swap\narea indexes bigger than 8 by truncating lower bits of swap entries.\nConsequently, systems with more than 8 swap areas could trigger a\nbogus OOM scenario when swapping out to such a swap area. This update\nfixes this problem by reducing a return value of the SWP_TYPE_SHIFT()\nfunction and removing a broken function call from the\nread_swap_header() function. (BZ#1099727)\n\n* The automatic route cache rebuilding feature could incorrectly\ncompute the length of a route hash chain if the cache contained\nmultiple entries with the same key but a different TOS, mark, or OIF\nbit. Consequently, the feature could reach the rebuild limit and\ndisable the routing cache on the system. This problem is fixed by\nusing a helper function that avoids counting such duplicate routes.\n(BZ#1113823)\n\n* When booting a guest in the Hyper-V environment and enough of\nProgrammable Interval Timer (PIT) interrupts were lost or not injected\ninto the guest on time, the kernel panicked and the guest failed to\nboot. This problem has been fixed by bypassing the relevant PIT check\nwhen the guest is running under the Hyper-V environment. (BZ#1112225)\n\nAll kernel users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. The system\nmust be rebooted for this update to take effect.", "edition": 25, "published": "2014-11-08T00:00:00", "title": "RHEL 6 : kernel (RHSA-2014:1101)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-2672", "CVE-2013-7339", "CVE-2014-2851", "CVE-2014-2678", "CVE-2014-2706"], "modified": "2014-11-08T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:python-perf-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-s390x", "p-cpe:/a:redhat:enterprise_linux:kernel-firmware", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "cpe:/o:redhat:enterprise_linux:6.4", "p-cpe:/a:redhat:enterprise_linux:kernel-debug", "p-cpe:/a:redhat:enterprise_linux:kernel-headers", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel", "p-cpe:/a:redhat:enterprise_linux:perf-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel", "p-cpe:/a:redhat:enterprise_linux:python-perf", "cpe:/o:redhat:enterprise_linux:6", "p-cpe:/a:redhat:enterprise_linux:perf", "p-cpe:/a:redhat:enterprise_linux:kernel-doc", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-i686"], "id": "REDHAT-RHSA-2014-1101.NASL", "href": "https://www.tenable.com/plugins/nessus/79043", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2014:1101. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(79043);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2013-7339\", \"CVE-2014-2672\", \"CVE-2014-2678\", \"CVE-2014-2706\", \"CVE-2014-2851\");\n script_bugtraq_id(66351, 66492, 66543, 66591, 66779);\n script_xref(name:\"RHSA\", value:\"2014:1101\");\n\n script_name(english:\"RHEL 6 : kernel (RHSA-2014:1101)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 6.4 Extended\nUpdate Support.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A use-after-free flaw was found in the way the ping_init_sock()\nfunction of the Linux kernel handled the group_info reference counter.\nA local, unprivileged user could use this flaw to crash the system or,\npotentially, escalate their privileges on the system. (CVE-2014-2851,\nImportant)\n\n* A NULL pointer dereference flaw was found in the\nrds_ib_laddr_check() function in the Linux kernel's implementation of\nReliable Datagram Sockets (RDS). A local, unprivileged user could use\nthis flaw to crash the system. (CVE-2013-7339, Moderate)\n\n* It was found that a remote attacker could use a race condition flaw\nin the ath_tx_aggr_sleep() function to crash the system by creating\nlarge network traffic on the system's Atheros 9k wireless network\nadapter. (CVE-2014-2672, Moderate)\n\n* A NULL pointer dereference flaw was found in the\nrds_iw_laddr_check() function in the Linux kernel's implementation of\nReliable Datagram Sockets (RDS). A local, unprivileged user could use\nthis flaw to crash the system. (CVE-2014-2678, Moderate)\n\n* A race condition flaw was found in the way the Linux kernel's\nmac80211 subsystem implementation handled synchronization between TX\nand STA wake-up code paths. A remote attacker could use this flaw to\ncrash the system. (CVE-2014-2706, Moderate)\n\nThis update also fixes the following bugs :\n\n* The Completely Fair Scheduler (CFS) did not verify whether the CFS\nperiod timer is running while throttling tasks on the CFS run queue.\nTherefore under certain circumstances, the CFS run queue became stuck\nbecause the CFS period timer was inactive and could not be restarted.\nTo fix this problem, the CFS now restarts the CFS period timer inside\nthe throttling function if it is inactive. (BZ#1120666)\n\n* A previous change to the SCSI code fixed a race condition that could\noccur when removing a SCSI device. However, that change caused\nperformance degradation because it used a certain function from the\nblock layer code that was returning different values compared with\nlater versions of the kernel. This update alters the SCSI code to\nproperly utilize the values returned by the block layer code.\n(BZ#1117581)\n\n* If a statically defined gateway became unreachable and its\ncorresponding neighbor entry entered a FAILED state, the gateway\nstayed in the FAILED state even after it became reachable again. This\nprevented routing of the traffic through that gateway. This update\nallows probing such a gateway automatically and routing the traffic\nthrough the gateway again once it becomes reachable. (BZ#1115262)\n\n* A miscalculation in the 'radix_tree' swap encoding corrupted swap\narea indexes bigger than 8 by truncating lower bits of swap entries.\nConsequently, systems with more than 8 swap areas could trigger a\nbogus OOM scenario when swapping out to such a swap area. This update\nfixes this problem by reducing a return value of the SWP_TYPE_SHIFT()\nfunction and removing a broken function call from the\nread_swap_header() function. (BZ#1099727)\n\n* The automatic route cache rebuilding feature could incorrectly\ncompute the length of a route hash chain if the cache contained\nmultiple entries with the same key but a different TOS, mark, or OIF\nbit. Consequently, the feature could reach the rebuild limit and\ndisable the routing cache on the system. This problem is fixed by\nusing a helper function that avoids counting such duplicate routes.\n(BZ#1113823)\n\n* When booting a guest in the Hyper-V environment and enough of\nProgrammable Interval Timer (PIT) interrupts were lost or not injected\ninto the guest on time, the kernel panicked and the guest failed to\nboot. This problem has been fixed by bypassing the relevant PIT check\nwhen the guest is running under the Hyper-V environment. (BZ#1112225)\n\nAll kernel users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. The system\nmust be rebooted for this update to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2014:1101\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2013-7339\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-2672\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-2678\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-2706\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-2851\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-i686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-s390x\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/03/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/08/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/11/08\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2013-7339\", \"CVE-2014-2672\", \"CVE-2014-2678\", \"CVE-2014-2706\", \"CVE-2014-2851\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2014:1101\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2014:1101\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"i686\", reference:\"kernel-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"s390x\", reference:\"kernel-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"i686\", reference:\"kernel-debug-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"s390x\", reference:\"kernel-debug-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-debug-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"i686\", reference:\"kernel-debug-debuginfo-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"s390x\", reference:\"kernel-debug-debuginfo-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-debug-debuginfo-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"i686\", reference:\"kernel-debug-devel-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"s390x\", reference:\"kernel-debug-devel-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-debug-devel-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"i686\", reference:\"kernel-debuginfo-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"s390x\", reference:\"kernel-debuginfo-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-debuginfo-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"i686\", reference:\"kernel-debuginfo-common-i686-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"s390x\", reference:\"kernel-debuginfo-common-s390x-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-debuginfo-common-x86_64-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"i686\", reference:\"kernel-devel-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"s390x\", reference:\"kernel-devel-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-devel-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"kernel-doc-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"kernel-firmware-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"i686\", reference:\"kernel-headers-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"s390x\", reference:\"kernel-headers-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-headers-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"s390x\", reference:\"kernel-kdump-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"s390x\", reference:\"kernel-kdump-debuginfo-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"s390x\", reference:\"kernel-kdump-devel-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"i686\", reference:\"perf-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"s390x\", reference:\"perf-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"perf-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"i686\", reference:\"perf-debuginfo-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"s390x\", reference:\"perf-debuginfo-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"perf-debuginfo-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"i686\", reference:\"python-perf-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"s390x\", reference:\"python-perf-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"x86_64\", reference:\"python-perf-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"i686\", reference:\"python-perf-debuginfo-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"s390x\", reference:\"python-perf-debuginfo-2.6.32-358.48.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"python-perf-debuginfo-2.6.32-358.48.1.el6\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-debug / kernel-debug-debuginfo / kernel-debug-devel / etc\");\n }\n}\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T12:49:07", "description": "From Red Hat Security Advisory 2014:1023 :\n\nUpdated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 7.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* It was found that Linux kernel's ptrace subsystem did not properly\nsanitize the address-space-control bits when the program-status word\n(PSW) was being set. On IBM S/390 systems, a local, unprivileged user\ncould use this flaw to set address-space-control bits to the kernel\nspace, and thus gain read and write access to kernel memory.\n(CVE-2014-3534, Important)\n\n* It was found that the permission checks performed by the Linux\nkernel when a netlink message was received were not sufficient. A\nlocal, unprivileged user could potentially bypass these restrictions\nby passing a netlink socket as stdout or stderr to a more privileged\nprocess and altering the output of this process. (CVE-2014-0181,\nModerate)\n\n* It was found that a remote attacker could use a race condition flaw\nin the ath_tx_aggr_sleep() function to crash the system by creating\nlarge network traffic on the system's Atheros 9k wireless network\nadapter. (CVE-2014-2672, Moderate)\n\n* A flaw was found in the way the Linux kernel performed forking\ninside of a transaction. A local, unprivileged user on a PowerPC\nsystem that supports transactional memory could use this flaw to crash\nthe system. (CVE-2014-2673, Moderate)\n\n* A race condition flaw was found in the way the Linux kernel's\nmac80211 subsystem implementation handled synchronization between TX\nand STA wake-up code paths. A remote attacker could use this flaw to\ncrash the system. (CVE-2014-2706, Moderate)\n\n* An integer underflow flaw was found in the way the Linux kernel's\nStream Control Transmission Protocol (SCTP) implementation processed\ncertain COOKIE_ECHO packets. By sending a specially crafted SCTP\npacket, a remote attacker could use this flaw to prevent legitimate\nconnections to a particular SCTP server socket to be made.\n(CVE-2014-4667, Moderate)\n\nRed Hat would like to thank Martin Schwidefsky of IBM for reporting\nCVE-2014-3534, Andy Lutomirski for reporting CVE-2014-0181, and Gopal\nReddy Kodudula of Nokia Siemens Networks for reporting CVE-2014-4667.\n\nThis update also fixes the following bugs :\n\n* Due to a NULL pointer dereference bug in the IPIP and SIT tunneling\ncode, a kernel panic could be triggered when using IPIP or SIT tunnels\nwith IPsec. This update restructures the related code to avoid a NULL\npointer dereference and the kernel no longer panics when using IPIP or\nSIT tunnels with IPsec. (BZ#1114957)\n\n* Previously, an IBM POWER8 system could terminate unexpectedly when\nthe kernel received an IRQ while handling a transactional memory\nre-checkpoint critical section. This update ensures that IRQs are\ndisabled in this situation and the problem no longer occurs.\n(BZ#1113150)\n\n* A missing read memory barrier, rmb(), in the bnx2x driver caused the\nkernel to crash under various circumstances. This problem has been\nfixed by adding an rmb() call to the relevant place in the bnx2x code.\n(BZ#1107721)\n\n* The hpwdt driver previously emitted a panic message that was\nmisleading on certain HP systems. This update ensures that upon a\nkernel panic, hpwdt displays information valid on all HP systems.\n(BZ#1096961)\n\n* The qla2xxx driver has been upgraded to version 8.06.00.08.07.0-k3,\nwhich provides a number of bug fixes over the previous version in\norder to correct various timeout problems with the mailbox commands.\n(BZ#1112389)\n\n* The SCSI mid-layer could retry an I/O operation indefinitely if a\nstorage array repeatedly returned a CHECK CONDITION status to that I/O\noperation but the sense data was invalid. This update fixes the\nproblem by limiting a time for which is such an I/O operation retried.\n(BZ#1114468)\n\nAll kernel users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. The system\nmust be rebooted for this update to take effect.", "edition": 22, "published": "2014-08-07T00:00:00", "title": "Oracle Linux 7 : kernel (ELSA-2014-1023)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-2672", "CVE-2014-3534", "CVE-2014-2673", "CVE-2014-0181", "CVE-2014-4667", "CVE-2014-2706"], "modified": "2014-08-07T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:kernel-debug", "p-cpe:/a:oracle:linux:kernel-devel", "p-cpe:/a:oracle:linux:kernel-doc", "p-cpe:/a:oracle:linux:kernel-tools", "p-cpe:/a:oracle:linux:kernel-debug-devel", "p-cpe:/a:oracle:linux:kernel-tools-libs", "p-cpe:/a:oracle:linux:kernel-headers", "p-cpe:/a:oracle:linux:kernel-abi-whitelists", "p-cpe:/a:oracle:linux:kernel", "cpe:/o:oracle:linux:7", "p-cpe:/a:oracle:linux:kernel-tools-libs-devel"], "id": "ORACLELINUX_ELSA-2014-1023.NASL", "href": "https://www.tenable.com/plugins/nessus/77045", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2014:1023 and \n# Oracle Linux Security Advisory ELSA-2014-1023 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(77045);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2014-0181\", \"CVE-2014-2672\", \"CVE-2014-2673\", \"CVE-2014-2706\", \"CVE-2014-3534\", \"CVE-2014-4667\");\n script_bugtraq_id(68683);\n script_xref(name:\"RHSA\", value:\"2014:1023\");\n\n script_name(english:\"Oracle Linux 7 : kernel (ELSA-2014-1023)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2014:1023 :\n\nUpdated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 7.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* It was found that Linux kernel's ptrace subsystem did not properly\nsanitize the address-space-control bits when the program-status word\n(PSW) was being set. On IBM S/390 systems, a local, unprivileged user\ncould use this flaw to set address-space-control bits to the kernel\nspace, and thus gain read and write access to kernel memory.\n(CVE-2014-3534, Important)\n\n* It was found that the permission checks performed by the Linux\nkernel when a netlink message was received were not sufficient. A\nlocal, unprivileged user could potentially bypass these restrictions\nby passing a netlink socket as stdout or stderr to a more privileged\nprocess and altering the output of this process. (CVE-2014-0181,\nModerate)\n\n* It was found that a remote attacker could use a race condition flaw\nin the ath_tx_aggr_sleep() function to crash the system by creating\nlarge network traffic on the system's Atheros 9k wireless network\nadapter. (CVE-2014-2672, Moderate)\n\n* A flaw was found in the way the Linux kernel performed forking\ninside of a transaction. A local, unprivileged user on a PowerPC\nsystem that supports transactional memory could use this flaw to crash\nthe system. (CVE-2014-2673, Moderate)\n\n* A race condition flaw was found in the way the Linux kernel's\nmac80211 subsystem implementation handled synchronization between TX\nand STA wake-up code paths. A remote attacker could use this flaw to\ncrash the system. (CVE-2014-2706, Moderate)\n\n* An integer underflow flaw was found in the way the Linux kernel's\nStream Control Transmission Protocol (SCTP) implementation processed\ncertain COOKIE_ECHO packets. By sending a specially crafted SCTP\npacket, a remote attacker could use this flaw to prevent legitimate\nconnections to a particular SCTP server socket to be made.\n(CVE-2014-4667, Moderate)\n\nRed Hat would like to thank Martin Schwidefsky of IBM for reporting\nCVE-2014-3534, Andy Lutomirski for reporting CVE-2014-0181, and Gopal\nReddy Kodudula of Nokia Siemens Networks for reporting CVE-2014-4667.\n\nThis update also fixes the following bugs :\n\n* Due to a NULL pointer dereference bug in the IPIP and SIT tunneling\ncode, a kernel panic could be triggered when using IPIP or SIT tunnels\nwith IPsec. This update restructures the related code to avoid a NULL\npointer dereference and the kernel no longer panics when using IPIP or\nSIT tunnels with IPsec. (BZ#1114957)\n\n* Previously, an IBM POWER8 system could terminate unexpectedly when\nthe kernel received an IRQ while handling a transactional memory\nre-checkpoint critical section. This update ensures that IRQs are\ndisabled in this situation and the problem no longer occurs.\n(BZ#1113150)\n\n* A missing read memory barrier, rmb(), in the bnx2x driver caused the\nkernel to crash under various circumstances. This problem has been\nfixed by adding an rmb() call to the relevant place in the bnx2x code.\n(BZ#1107721)\n\n* The hpwdt driver previously emitted a panic message that was\nmisleading on certain HP systems. This update ensures that upon a\nkernel panic, hpwdt displays information valid on all HP systems.\n(BZ#1096961)\n\n* The qla2xxx driver has been upgraded to version 8.06.00.08.07.0-k3,\nwhich provides a number of bug fixes over the previous version in\norder to correct various timeout problems with the mailbox commands.\n(BZ#1112389)\n\n* The SCSI mid-layer could retry an I/O operation indefinitely if a\nstorage array repeatedly returned a CHECK CONDITION status to that I/O\noperation but the sense data was invalid. This update fixes the\nproblem by limiting a time for which is such an I/O operation retried.\n(BZ#1114468)\n\nAll kernel users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. The system\nmust be rebooted for this update to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2014-August/004338.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/04/01\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/08/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/08/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 7\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2014-0181\", \"CVE-2014-2672\", \"CVE-2014-2673\", \"CVE-2014-2706\", \"CVE-2014-3534\", \"CVE-2014-4667\"); \n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for ELSA-2014-1023\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nkernel_major_minor = get_kb_item(\"Host/uname/major_minor\");\nif (empty_or_null(kernel_major_minor)) exit(1, \"Unable to determine kernel major-minor level.\");\nexpected_kernel_major_minor = \"3.10\";\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, \"running kernel level \" + expected_kernel_major_minor + \", it is running kernel level \" + kernel_major_minor);\n\nflag = 0;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-3.10.0-123.6.3.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-abi-whitelists-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-abi-whitelists-3.10.0-123.6.3.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-debug-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-debug-3.10.0-123.6.3.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-debug-devel-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-debug-devel-3.10.0-123.6.3.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-devel-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-devel-3.10.0-123.6.3.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-doc-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-doc-3.10.0-123.6.3.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-headers-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-headers-3.10.0-123.6.3.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-tools-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-tools-3.10.0-123.6.3.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-tools-libs-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-tools-libs-3.10.0-123.6.3.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-tools-libs-devel-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-tools-libs-devel-3.10.0-123.6.3.el7\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"affected kernel\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T13:14:51", "description": "Updated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 7.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* It was found that Linux kernel's ptrace subsystem did not properly\nsanitize the address-space-control bits when the program-status word\n(PSW) was being set. On IBM S/390 systems, a local, unprivileged user\ncould use this flaw to set address-space-control bits to the kernel\nspace, and thus gain read and write access to kernel memory.\n(CVE-2014-3534, Important)\n\n* It was found that the permission checks performed by the Linux\nkernel when a netlink message was received were not sufficient. A\nlocal, unprivileged user could potentially bypass these restrictions\nby passing a netlink socket as stdout or stderr to a more privileged\nprocess and altering the output of this process. (CVE-2014-0181,\nModerate)\n\n* It was found that a remote attacker could use a race condition flaw\nin the ath_tx_aggr_sleep() function to crash the system by creating\nlarge network traffic on the system's Atheros 9k wireless network\nadapter. (CVE-2014-2672, Moderate)\n\n* A flaw was found in the way the Linux kernel performed forking\ninside of a transaction. A local, unprivileged user on a PowerPC\nsystem that supports transactional memory could use this flaw to crash\nthe system. (CVE-2014-2673, Moderate)\n\n* A race condition flaw was found in the way the Linux kernel's\nmac80211 subsystem implementation handled synchronization between TX\nand STA wake-up code paths. A remote attacker could use this flaw to\ncrash the system. (CVE-2014-2706, Moderate)\n\n* An integer underflow flaw was found in the way the Linux kernel's\nStream Control Transmission Protocol (SCTP) implementation processed\ncertain COOKIE_ECHO packets. By sending a specially crafted SCTP\npacket, a remote attacker could use this flaw to prevent legitimate\nconnections to a particular SCTP server socket to be made.\n(CVE-2014-4667, Moderate)\n\nRed Hat would like to thank Martin Schwidefsky of IBM for reporting\nCVE-2014-3534, Andy Lutomirski for reporting CVE-2014-0181, and Gopal\nReddy Kodudula of Nokia Siemens Networks for reporting CVE-2014-4667.\n\nThis update also fixes the following bugs :\n\n* Due to a NULL pointer dereference bug in the IPIP and SIT tunneling\ncode, a kernel panic could be triggered when using IPIP or SIT tunnels\nwith IPsec. This update restructures the related code to avoid a NULL\npointer dereference and the kernel no longer panics when using IPIP or\nSIT tunnels with IPsec. (BZ#1114957)\n\n* Previously, an IBM POWER8 system could terminate unexpectedly when\nthe kernel received an IRQ while handling a transactional memory\nre-checkpoint critical section. This update ensures that IRQs are\ndisabled in this situation and the problem no longer occurs.\n(BZ#1113150)\n\n* A missing read memory barrier, rmb(), in the bnx2x driver caused the\nkernel to crash under various circumstances. This problem has been\nfixed by adding an rmb() call to the relevant place in the bnx2x code.\n(BZ#1107721)\n\n* The hpwdt driver previously emitted a panic message that was\nmisleading on certain HP systems. This update ensures that upon a\nkernel panic, hpwdt displays information valid on all HP systems.\n(BZ#1096961)\n\n* The qla2xxx driver has been upgraded to version 8.06.00.08.07.0-k3,\nwhich provides a number of bug fixes over the previous version in\norder to correct various timeout problems with the mailbox commands.\n(BZ#1112389)\n\n* The SCSI mid-layer could retry an I/O operation indefinitely if a\nstorage array repeatedly returned a CHECK CONDITION status to that I/O\noperation but the sense data was invalid. This update fixes the\nproblem by limiting a time for which is such an I/O operation retried.\n(BZ#1114468)\n\nAll kernel users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. The system\nmust be rebooted for this update to take effect.", "edition": 25, "published": "2014-08-07T00:00:00", "title": "RHEL 7 : kernel (RHSA-2014:1023)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-2672", "CVE-2014-3534", "CVE-2014-2673", "CVE-2014-0181", "CVE-2014-4667", "CVE-2014-2706"], "modified": "2014-08-07T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:python-perf-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists", "cpe:/o:redhat:enterprise_linux:7.4", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-s390x", "p-cpe:/a:redhat:enterprise_linux:kernel-tools-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs-devel", "cpe:/o:redhat:enterprise_linux:7.7", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-debug", "cpe:/o:redhat:enterprise_linux:7.5", "p-cpe:/a:redhat:enterprise_linux:kernel-headers", "cpe:/o:redhat:enterprise_linux:7", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel", "p-cpe:/a:redhat:enterprise_linux:perf-debuginfo", "cpe:/o:redhat:enterprise_linux:7.3", "p-cpe:/a:redhat:enterprise_linux:kernel-tools", "p-cpe:/a:redhat:enterprise_linux:kernel", "cpe:/o:redhat:enterprise_linux:7.6", "p-cpe:/a:redhat:enterprise_linux:python-perf", "p-cpe:/a:redhat:enterprise_linux:perf", "p-cpe:/a:redhat:enterprise_linux:kernel-doc"], "id": "REDHAT-RHSA-2014-1023.NASL", "href": "https://www.tenable.com/plugins/nessus/77046", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2014:1023. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(77046);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2014-0181\", \"CVE-2014-2672\", \"CVE-2014-2673\", \"CVE-2014-2706\", \"CVE-2014-3534\", \"CVE-2014-4667\");\n script_xref(name:\"RHSA\", value:\"2014:1023\");\n\n script_name(english:\"RHEL 7 : kernel (RHSA-2014:1023)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 7.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* It was found that Linux kernel's ptrace subsystem did not properly\nsanitize the address-space-control bits when the program-status word\n(PSW) was being set. On IBM S/390 systems, a local, unprivileged user\ncould use this flaw to set address-space-control bits to the kernel\nspace, and thus gain read and write access to kernel memory.\n(CVE-2014-3534, Important)\n\n* It was found that the permission checks performed by the Linux\nkernel when a netlink message was received were not sufficient. A\nlocal, unprivileged user could potentially bypass these restrictions\nby passing a netlink socket as stdout or stderr to a more privileged\nprocess and altering the output of this process. (CVE-2014-0181,\nModerate)\n\n* It was found that a remote attacker could use a race condition flaw\nin the ath_tx_aggr_sleep() function to crash the system by creating\nlarge network traffic on the system's Atheros 9k wireless network\nadapter. (CVE-2014-2672, Moderate)\n\n* A flaw was found in the way the Linux kernel performed forking\ninside of a transaction. A local, unprivileged user on a PowerPC\nsystem that supports transactional memory could use this flaw to crash\nthe system. (CVE-2014-2673, Moderate)\n\n* A race condition flaw was found in the way the Linux kernel's\nmac80211 subsystem implementation handled synchronization between TX\nand STA wake-up code paths. A remote attacker could use this flaw to\ncrash the system. (CVE-2014-2706, Moderate)\n\n* An integer underflow flaw was found in the way the Linux kernel's\nStream Control Transmission Protocol (SCTP) implementation processed\ncertain COOKIE_ECHO packets. By sending a specially crafted SCTP\npacket, a remote attacker could use this flaw to prevent legitimate\nconnections to a particular SCTP server socket to be made.\n(CVE-2014-4667, Moderate)\n\nRed Hat would like to thank Martin Schwidefsky of IBM for reporting\nCVE-2014-3534, Andy Lutomirski for reporting CVE-2014-0181, and Gopal\nReddy Kodudula of Nokia Siemens Networks for reporting CVE-2014-4667.\n\nThis update also fixes the following bugs :\n\n* Due to a NULL pointer dereference bug in the IPIP and SIT tunneling\ncode, a kernel panic could be triggered when using IPIP or SIT tunnels\nwith IPsec. This update restructures the related code to avoid a NULL\npointer dereference and the kernel no longer panics when using IPIP or\nSIT tunnels with IPsec. (BZ#1114957)\n\n* Previously, an IBM POWER8 system could terminate unexpectedly when\nthe kernel received an IRQ while handling a transactional memory\nre-checkpoint critical section. This update ensures that IRQs are\ndisabled in this situation and the problem no longer occurs.\n(BZ#1113150)\n\n* A missing read memory barrier, rmb(), in the bnx2x driver caused the\nkernel to crash under various circumstances. This problem has been\nfixed by adding an rmb() call to the relevant place in the bnx2x code.\n(BZ#1107721)\n\n* The hpwdt driver previously emitted a panic message that was\nmisleading on certain HP systems. This update ensures that upon a\nkernel panic, hpwdt displays information valid on all HP systems.\n(BZ#1096961)\n\n* The qla2xxx driver has been upgraded to version 8.06.00.08.07.0-k3,\nwhich provides a number of bug fixes over the previous version in\norder to correct various timeout problems with the mailbox commands.\n(BZ#1112389)\n\n* The SCSI mid-layer could retry an I/O operation indefinitely if a\nstorage array repeatedly returned a CHECK CONDITION status to that I/O\noperation but the sense data was invalid. This update fixes the\nproblem by limiting a time for which is such an I/O operation retried.\n(BZ#1114468)\n\nAll kernel users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. The system\nmust be rebooted for this update to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2014:1023\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-2672\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-2706\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-0181\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-4667\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-2673\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-3534\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-s390x\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/04/01\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/08/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/08/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 7.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2014-0181\", \"CVE-2014-2672\", \"CVE-2014-2673\", \"CVE-2014-2706\", \"CVE-2014-3534\", \"CVE-2014-4667\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2014:1023\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2014:1023\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"kernel-abi-whitelists-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-debug-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-debug-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-debug-debuginfo-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-debug-debuginfo-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-debug-devel-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-debug-devel-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-debuginfo-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-debuginfo-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-debuginfo-common-s390x-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-debuginfo-common-x86_64-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-devel-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-devel-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"kernel-doc-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-headers-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-headers-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-kdump-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-kdump-debuginfo-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-kdump-devel-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-tools-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-tools-debuginfo-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-tools-libs-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-tools-libs-devel-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"perf-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"perf-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"perf-debuginfo-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"perf-debuginfo-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"python-perf-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"python-perf-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"python-perf-debuginfo-3.10.0-123.6.3.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"python-perf-debuginfo-3.10.0-123.6.3.el7\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-abi-whitelists / kernel-debug / etc\");\n }\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-06T09:29:40", "description": "Updated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 7.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* It was found that Linux kernel's ptrace subsystem did not properly\nsanitize the address-space-control bits when the program-status word\n(PSW) was being set. On IBM S/390 systems, a local, unprivileged user\ncould use this flaw to set address-space-control bits to the kernel\nspace, and thus gain read and write access to kernel memory.\n(CVE-2014-3534, Important)\n\n* It was found that the permission checks performed by the Linux\nkernel when a netlink message was received were not sufficient. A\nlocal, unprivileged user could potentially bypass these restrictions\nby passing a netlink socket as stdout or stderr to a more privileged\nprocess and altering the output of this process. (CVE-2014-0181,\nModerate)\n\n* It was found that a remote attacker could use a race condition flaw\nin the ath_tx_aggr_sleep() function to crash the system by creating\nlarge network traffic on the system's Atheros 9k wireless network\nadapter. (CVE-2014-2672, Moderate)\n\n* A flaw was found in the way the Linux kernel performed forking\ninside of a transaction. A local, unprivileged user on a PowerPC\nsystem that supports transactional memory could use this flaw to crash\nthe system. (CVE-2014-2673, Moderate)\n\n* A race condition flaw was found in the way the Linux kernel's\nmac80211 subsystem implementation handled synchronization between TX\nand STA wake-up code paths. A remote attacker could use this flaw to\ncrash the system. (CVE-2014-2706, Moderate)\n\n* An integer underflow flaw was found in the way the Linux kernel's\nStream Control Transmission Protocol (SCTP) implementation processed\ncertain COOKIE_ECHO packets. By sending a specially crafted SCTP\npacket, a remote attacker could use this flaw to prevent legitimate\nconnections to a particular SCTP server socket to be made.\n(CVE-2014-4667, Moderate)\n\nRed Hat would like to thank Martin Schwidefsky of IBM for reporting\nCVE-2014-3534, Andy Lutomirski for reporting CVE-2014-0181, and Gopal\nReddy Kodudula of Nokia Siemens Networks for reporting CVE-2014-4667.\n\nThis update also fixes the following bugs :\n\n* Due to a NULL pointer dereference bug in the IPIP and SIT tunneling\ncode, a kernel panic could be triggered when using IPIP or SIT tunnels\nwith IPsec. This update restructures the related code to avoid a NULL\npointer dereference and the kernel no longer panics when using IPIP or\nSIT tunnels with IPsec. (BZ#1114957)\n\n* Previously, an IBM POWER8 system could terminate unexpectedly when\nthe kernel received an IRQ while handling a transactional memory\nre-checkpoint critical section. This update ensures that IRQs are\ndisabled in this situation and the problem no longer occurs.\n(BZ#1113150)\n\n* A missing read memory barrier, rmb(), in the bnx2x driver caused the\nkernel to crash under various circumstances. This problem has been\nfixed by adding an rmb() call to the relevant place in the bnx2x code.\n(BZ#1107721)\n\n* The hpwdt driver previously emitted a panic message that was\nmisleading on certain HP systems. This update ensures that upon a\nkernel panic, hpwdt displays information valid on all HP systems.\n(BZ#1096961)\n\n* The qla2xxx driver has been upgraded to version 8.06.00.08.07.0-k3,\nwhich provides a number of bug fixes over the previous version in\norder to correct various timeout problems with the mailbox commands.\n(BZ#1112389)\n\n* The SCSI mid-layer could retry an I/O operation indefinitely if a\nstorage array repeatedly returned a CHECK CONDITION status to that I/O\noperation but the sense data was invalid. This update fixes the\nproblem by limiting a time for which is such an I/O operation retried.\n(BZ#1114468)\n\nAll kernel users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. The system\nmust be rebooted for this update to take effect.", "edition": 24, "published": "2014-08-07T00:00:00", "title": "CentOS 7 : kernel (CESA-2014:1023)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-2672", "CVE-2014-3534", "CVE-2014-2673", "CVE-2014-0181", "CVE-2014-4667", "CVE-2014-2706"], "modified": "2014-08-07T00:00:00", "cpe": ["p-cpe:/a:centos:centos:perf", "p-cpe:/a:centos:centos:python-perf", "p-cpe:/a:centos:centos:kernel-doc", "cpe:/o:centos:centos:7", "p-cpe:/a:centos:centos:kernel-tools-libs-devel", "p-cpe:/a:centos:centos:kernel-tools", "p-cpe:/a:centos:centos:kernel-devel", "p-cpe:/a:centos:centos:kernel", "p-cpe:/a:centos:centos:kernel-debug", "p-cpe:/a:centos:centos:kernel-tools-libs", "p-cpe:/a:centos:centos:kernel-headers", "p-cpe:/a:centos:centos:kernel-abi-whitelists", "p-cpe:/a:centos:centos:kernel-debug-devel"], "id": "CENTOS_RHSA-2014-1023.NASL", "href": "https://www.tenable.com/plugins/nessus/77034", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2014:1023 and \n# CentOS Errata and Security Advisory 2014:1023 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(77034);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2014-0181\", \"CVE-2014-2672\", \"CVE-2014-2673\", \"CVE-2014-2706\", \"CVE-2014-3534\", \"CVE-2014-4667\");\n script_xref(name:\"RHSA\", value:\"2014:1023\");\n\n script_name(english:\"CentOS 7 : kernel (CESA-2014:1023)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 7.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* It was found that Linux kernel's ptrace subsystem did not properly\nsanitize the address-space-control bits when the program-status word\n(PSW) was being set. On IBM S/390 systems, a local, unprivileged user\ncould use this flaw to set address-space-control bits to the kernel\nspace, and thus gain read and write access to kernel memory.\n(CVE-2014-3534, Important)\n\n* It was found that the permission checks performed by the Linux\nkernel when a netlink message was received were not sufficient. A\nlocal, unprivileged user could potentially bypass these restrictions\nby passing a netlink socket as stdout or stderr to a more privileged\nprocess and altering the output of this process. (CVE-2014-0181,\nModerate)\n\n* It was found that a remote attacker could use a race condition flaw\nin the ath_tx_aggr_sleep() function to crash the system by creating\nlarge network traffic on the system's Atheros 9k wireless network\nadapter. (CVE-2014-2672, Moderate)\n\n* A flaw was found in the way the Linux kernel performed forking\ninside of a transaction. A local, unprivileged user on a PowerPC\nsystem that supports transactional memory could use this flaw to crash\nthe system. (CVE-2014-2673, Moderate)\n\n* A race condition flaw was found in the way the Linux kernel's\nmac80211 subsystem implementation handled synchronization between TX\nand STA wake-up code paths. A remote attacker could use this flaw to\ncrash the system. (CVE-2014-2706, Moderate)\n\n* An integer underflow flaw was found in the way the Linux kernel's\nStream Control Transmission Protocol (SCTP) implementation processed\ncertain COOKIE_ECHO packets. By sending a specially crafted SCTP\npacket, a remote attacker could use this flaw to prevent legitimate\nconnections to a particular SCTP server socket to be made.\n(CVE-2014-4667, Moderate)\n\nRed Hat would like to thank Martin Schwidefsky of IBM for reporting\nCVE-2014-3534, Andy Lutomirski for reporting CVE-2014-0181, and Gopal\nReddy Kodudula of Nokia Siemens Networks for reporting CVE-2014-4667.\n\nThis update also fixes the following bugs :\n\n* Due to a NULL pointer dereference bug in the IPIP and SIT tunneling\ncode, a kernel panic could be triggered when using IPIP or SIT tunnels\nwith IPsec. This update restructures the related code to avoid a NULL\npointer dereference and the kernel no longer panics when using IPIP or\nSIT tunnels with IPsec. (BZ#1114957)\n\n* Previously, an IBM POWER8 system could terminate unexpectedly when\nthe kernel received an IRQ while handling a transactional memory\nre-checkpoint critical section. This update ensures that IRQs are\ndisabled in this situation and the problem no longer occurs.\n(BZ#1113150)\n\n* A missing read memory barrier, rmb(), in the bnx2x driver caused the\nkernel to crash under various circumstances. This problem has been\nfixed by adding an rmb() call to the relevant place in the bnx2x code.\n(BZ#1107721)\n\n* The hpwdt driver previously emitted a panic message that was\nmisleading on certain HP systems. This update ensures that upon a\nkernel panic, hpwdt displays information valid on all HP systems.\n(BZ#1096961)\n\n* The qla2xxx driver has been upgraded to version 8.06.00.08.07.0-k3,\nwhich provides a number of bug fixes over the previous version in\norder to correct various timeout problems with the mailbox commands.\n(BZ#1112389)\n\n* The SCSI mid-layer could retry an I/O operation indefinitely if a\nstorage array repeatedly returned a CHECK CONDITION status to that I/O\noperation but the sense data was invalid. This update fixes the\nproblem by limiting a time for which is such an I/O operation retried.\n(BZ#1114468)\n\nAll kernel users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. The system\nmust be rebooted for this update to take effect.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2014-August/020475.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?764a51a6\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2014-3534\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/04/01\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/08/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/08/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 7.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-3.10.0-123.6.3.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-abi-whitelists-3.10.0-123.6.3.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-debug-3.10.0-123.6.3.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-debug-devel-3.10.0-123.6.3.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-devel-3.10.0-123.6.3.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-doc-3.10.0-123.6.3.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-headers-3.10.0-123.6.3.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-tools-3.10.0-123.6.3.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-tools-libs-3.10.0-123.6.3.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-tools-libs-devel-3.10.0-123.6.3.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"perf-3.10.0-123.6.3.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"python-perf-3.10.0-123.6.3.el7\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-abi-whitelists / kernel-debug / kernel-debug-devel / etc\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-06T09:29:39", "description": "Updated kernel packages that fix multiple security issues, several\nbugs, and add one enhancement are now available for Red Hat Enterprise\nLinux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A use-after-free flaw was found in the way the ping_init_sock()\nfunction of the Linux kernel handled the group_info reference counter.\nA local, unprivileged user could use this flaw to crash the system or,\npotentially, escalate their privileges on the system. (CVE-2014-2851,\nImportant)\n\n* A NULL pointer dereference flaw was found in the way the\nfutex_wait_requeue_pi() function of the Linux kernel's futex subsystem\nhandled the requeuing of certain Priority Inheritance (PI) futexes. A\nlocal, unprivileged user could use this flaw to crash the system.\n(CVE-2012-6647, Moderate)\n\n* A NULL pointer dereference flaw was found in the\nrds_ib_laddr_check() function in the Linux kernel's implementation of\nReliable Datagram Sockets (RDS). A local, unprivileged user could use\nthis flaw to crash the system. (CVE-2013-7339, Moderate)\n\n* It was found that a remote attacker could use a race condition flaw\nin the ath_tx_aggr_sleep() function to crash the system by creating\nlarge network traffic on the system's Atheros 9k wireless network\nadapter. (CVE-2014-2672, Moderate)\n\n* A NULL pointer dereference flaw was found in the\nrds_iw_laddr_check() function in the Linux kernel's implementation of\nReliable Datagram Sockets (RDS). A local, unprivileged user could use\nthis flaw to crash the system. (CVE-2014-2678, Moderate)\n\n* A race condition flaw was found in the way the Linux kernel's\nmac80211 subsystem implementation handled synchronization between TX\nand STA wake-up code paths. A remote attacker could use this flaw to\ncrash the system. (CVE-2014-2706, Moderate)\n\n* An out-of-bounds memory access flaw was found in the Netlink\nAttribute extension of the Berkeley Packet Filter (BPF) interpreter\nfunctionality in the Linux kernel's networking implementation. A\nlocal, unprivileged user could use this flaw to crash the system or\nleak kernel memory to user space via a specially crafted socket\nfilter. (CVE-2014-3144, CVE-2014-3145, Moderate)\n\nThis update also fixes several bugs and adds one enhancement.\nDocumentation for these changes will be available shortly from the\nTechnical Notes document linked to in the References section.\n\nAll kernel users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues and add this\nenhancement. The system must be rebooted for this update to take\neffect.", "edition": 26, "published": "2014-08-01T00:00:00", "title": "CentOS 6 : kernel (CESA-2014:0981)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-2672", "CVE-2012-6647", "CVE-2014-3145", "CVE-2013-7339", "CVE-2014-2851", "CVE-2014-2678", "CVE-2014-3144", "CVE-2014-2706"], "modified": "2014-08-01T00:00:00", "cpe": ["cpe:/o:centos:centos:6", "p-cpe:/a:centos:centos:perf", "p-cpe:/a:centos:centos:python-perf", "p-cpe:/a:centos:centos:kernel-doc", "p-cpe:/a:centos:centos:kernel-devel", "p-cpe:/a:centos:centos:kernel", "p-cpe:/a:centos:centos:kernel-debug", "p-cpe:/a:centos:centos:kernel-headers", "p-cpe:/a:centos:centos:kernel-firmware", "p-cpe:/a:centos:centos:kernel-abi-whitelists", "p-cpe:/a:centos:centos:kernel-debug-devel"], "id": "CENTOS_RHSA-2014-0981.NASL", "href": "https://www.tenable.com/plugins/nessus/76948", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2014:0981 and \n# CentOS Errata and Security Advisory 2014:0981 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(76948);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2012-6647\", \"CVE-2013-7339\", \"CVE-2014-2672\", \"CVE-2014-2678\", \"CVE-2014-2706\", \"CVE-2014-2851\", \"CVE-2014-3144\", \"CVE-2014-3145\");\n script_bugtraq_id(66351, 66492, 66543, 66591, 66779, 67309, 67321, 67395);\n script_xref(name:\"RHSA\", value:\"2014:0981\");\n\n script_name(english:\"CentOS 6 : kernel (CESA-2014:0981)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix multiple security issues, several\nbugs, and add one enhancement are now available for Red Hat Enterprise\nLinux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A use-after-free flaw was found in the way the ping_init_sock()\nfunction of the Linux kernel handled the group_info reference counter.\nA local, unprivileged user could use this flaw to crash the system or,\npotentially, escalate their privileges on the system. (CVE-2014-2851,\nImportant)\n\n* A NULL pointer dereference flaw was found in the way the\nfutex_wait_requeue_pi() function of the Linux kernel's futex subsystem\nhandled the requeuing of certain Priority Inheritance (PI) futexes. A\nlocal, unprivileged user could use this flaw to crash the system.\n(CVE-2012-6647, Moderate)\n\n* A NULL pointer dereference flaw was found in the\nrds_ib_laddr_check() function in the Linux kernel's implementation of\nReliable Datagram Sockets (RDS). A local, unprivileged user could use\nthis flaw to crash the system. (CVE-2013-7339, Moderate)\n\n* It was found that a remote attacker could use a race condition flaw\nin the ath_tx_aggr_sleep() function to crash the system by creating\nlarge network traffic on the system's Atheros 9k wireless network\nadapter. (CVE-2014-2672, Moderate)\n\n* A NULL pointer dereference flaw was found in the\nrds_iw_laddr_check() function in the Linux kernel's implementation of\nReliable Datagram Sockets (RDS). A local, unprivileged user could use\nthis flaw to crash the system. (CVE-2014-2678, Moderate)\n\n* A race condition flaw was found in the way the Linux kernel's\nmac80211 subsystem implementation handled synchronization between TX\nand STA wake-up code paths. A remote attacker could use this flaw to\ncrash the system. (CVE-2014-2706, Moderate)\n\n* An out-of-bounds memory access flaw was found in the Netlink\nAttribute extension of the Berkeley Packet Filter (BPF) interpreter\nfunctionality in the Linux kernel's networking implementation. A\nlocal, unprivileged user could use this flaw to crash the system or\nleak kernel memory to user space via a specially crafted socket\nfilter. (CVE-2014-3144, CVE-2014-3145, Moderate)\n\nThis update also fixes several bugs and adds one enhancement.\nDocumentation for these changes will be available shortly from the\nTechnical Notes document linked to in the References section.\n\nAll kernel users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues and add this\nenhancement. The system must be rebooted for this update to take\neffect.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2014-July/020458.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?71444326\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2014-2672\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/03/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/07/31\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/08/01\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 6.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-2.6.32-431.23.3.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-abi-whitelists-2.6.32-431.23.3.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-debug-2.6.32-431.23.3.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-debug-devel-2.6.32-431.23.3.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-devel-2.6.32-431.23.3.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-doc-2.6.32-431.23.3.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-firmware-2.6.32-431.23.3.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-headers-2.6.32-431.23.3.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"perf-2.6.32-431.23.3.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"python-perf-2.6.32-431.23.3.el6\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-abi-whitelists / kernel-debug / kernel-debug-devel / etc\");\n}\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T12:49:06", "description": "From Red Hat Security Advisory 2014:0981 :\n\nUpdated kernel packages that fix multiple security issues, several\nbugs, and add one enhancement are now available for Red Hat Enterprise\nLinux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A use-after-free flaw was found in the way the ping_init_sock()\nfunction of the Linux kernel handled the group_info reference counter.\nA local, unprivileged user could use this flaw to crash the system or,\npotentially, escalate their privileges on the system. (CVE-2014-2851,\nImportant)\n\n* A NULL pointer dereference flaw was found in the way the\nfutex_wait_requeue_pi() function of the Linux kernel's futex subsystem\nhandled the requeuing of certain Priority Inheritance (PI) futexes. A\nlocal, unprivileged user could use this flaw to crash the system.\n(CVE-2012-6647, Moderate)\n\n* A NULL pointer dereference flaw was found in the\nrds_ib_laddr_check() function in the Linux kernel's implementation of\nReliable Datagram Sockets (RDS). A local, unprivileged user could use\nthis flaw to crash the system. (CVE-2013-7339, Moderate)\n\n* It was found that a remote attacker could use a race condition flaw\nin the ath_tx_aggr_sleep() function to crash the system by creating\nlarge network traffic on the system's Atheros 9k wireless network\nadapter. (CVE-2014-2672, Moderate)\n\n* A NULL pointer dereference flaw was found in the\nrds_iw_laddr_check() function in the Linux kernel's implementation of\nReliable Datagram Sockets (RDS). A local, unprivileged user could use\nthis flaw to crash the system. (CVE-2014-2678, Moderate)\n\n* A race condition flaw was found in the way the Linux kernel's\nmac80211 subsystem implementation handled synchronization between TX\nand STA wake-up code paths. A remote attacker could use this flaw to\ncrash the system. (CVE-2014-2706, Moderate)\n\n* An out-of-bounds memory access flaw was found in the Netlink\nAttribute extension of the Berkeley Packet Filter (BPF) interpreter\nfunctionality in the Linux kernel's networking implementation. A\nlocal, unprivileged user could use this flaw to crash the system or\nleak kernel memory to user space via a specially crafted socket\nfilter. (CVE-2014-3144, CVE-2014-3145, Moderate)\n\nThis update also fixes several bugs and adds one enhancement.\nDocumentation for these changes will be available shortly from the\nTechnical Notes document linked to in the References section.\n\nAll kernel users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues and add this\nenhancement. The system must be rebooted for this update to take\neffect.", "edition": 23, "published": "2014-07-30T00:00:00", "title": "Oracle Linux 6 : kernel (ELSA-2014-0981)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-2672", "CVE-2012-6647", "CVE-2014-3145", "CVE-2013-7339", "CVE-2014-2851", "CVE-2014-2678", "CVE-2014-3144", "CVE-2014-2706"], "modified": "2014-07-30T00:00:00", "cpe": ["cpe:/o:oracle:linux:6", "p-cpe:/a:oracle:linux:kernel-debug", "p-cpe:/a:oracle:linux:kernel-devel", "p-cpe:/a:oracle:linux:kernel-doc", "p-cpe:/a:oracle:linux:perf", "p-cpe:/a:oracle:linux:kernel-debug-devel", "p-cpe:/a:oracle:linux:kernel-headers", "p-cpe:/a:oracle:linux:kernel-abi-whitelists", "p-cpe:/a:oracle:linux:kernel", "p-cpe:/a:oracle:linux:kernel-firmware", "p-cpe:/a:oracle:linux:python-perf"], "id": "ORACLELINUX_ELSA-2014-0981.NASL", "href": "https://www.tenable.com/plugins/nessus/76888", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2014:0981 and \n# Oracle Linux Security Advisory ELSA-2014-0981 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(76888);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2012-6647\", \"CVE-2013-7339\", \"CVE-2014-2672\", \"CVE-2014-2678\", \"CVE-2014-2706\", \"CVE-2014-2851\", \"CVE-2014-3144\", \"CVE-2014-3145\");\n script_bugtraq_id(66351, 66492, 66543, 66591, 66779, 67300, 67302, 67309, 67321, 67395, 67906, 68125, 68411, 68683);\n script_xref(name:\"RHSA\", value:\"2014:0981\");\n\n script_name(english:\"Oracle Linux 6 : kernel (ELSA-2014-0981)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2014:0981 :\n\nUpdated kernel packages that fix multiple security issues, several\nbugs, and add one enhancement are now available for Red Hat Enterprise\nLinux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A use-after-free flaw was found in the way the ping_init_sock()\nfunction of the Linux kernel handled the group_info reference counter.\nA local, unprivileged user could use this flaw to crash the system or,\npotentially, escalate their privileges on the system. (CVE-2014-2851,\nImportant)\n\n* A NULL pointer dereference flaw was found in the way the\nfutex_wait_requeue_pi() function of the Linux kernel's futex subsystem\nhandled the requeuing of certain Priority Inheritance (PI) futexes. A\nlocal, unprivileged user could use this flaw to crash the system.\n(CVE-2012-6647, Moderate)\n\n* A NULL pointer dereference flaw was found in the\nrds_ib_laddr_check() function in the Linux kernel's implementation of\nReliable Datagram Sockets (RDS). A local, unprivileged user could use\nthis flaw to crash the system. (CVE-2013-7339, Moderate)\n\n* It was found that a remote attacker could use a race condition flaw\nin the ath_tx_aggr_sleep() function to crash the system by creating\nlarge network traffic on the system's Atheros 9k wireless network\nadapter. (CVE-2014-2672, Moderate)\n\n* A NULL pointer dereference flaw was found in the\nrds_iw_laddr_check() function in the Linux kernel's implementation of\nReliable Datagram Sockets (RDS). A local, unprivileged user could use\nthis flaw to crash the system. (CVE-2014-2678, Moderate)\n\n* A race condition flaw was found in the way the Linux kernel's\nmac80211 subsystem implementation handled synchronization between TX\nand STA wake-up code paths. A remote attacker could use this flaw to\ncrash the system. (CVE-2014-2706, Moderate)\n\n* An out-of-bounds memory access flaw was found in the Netlink\nAttribute extension of the Berkeley Packet Filter (BPF) interpreter\nfunctionality in the Linux kernel's networking implementation. A\nlocal, unprivileged user could use this flaw to crash the system or\nleak kernel memory to user space via a specially crafted socket\nfilter. (CVE-2014-3144, CVE-2014-3145, Moderate)\n\nThis update also fixes several bugs and adds one enhancement.\nDocumentation for these changes will be available shortly from the\nTechnical Notes document linked to in the References section.\n\nAll kernel users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues and add this\nenhancement. The system must be rebooted for this update to take\neffect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2014-July/004306.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/03/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/07/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/07/30\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 6\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2012-6647\", \"CVE-2013-7339\", \"CVE-2014-2672\", \"CVE-2014-2678\", \"CVE-2014-2706\", \"CVE-2014-2851\", \"CVE-2014-3144\", \"CVE-2014-3145\"); \n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for ELSA-2014-0981\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nkernel_major_minor = get_kb_item(\"Host/uname/major_minor\");\nif (empty_or_null(kernel_major_minor)) exit(1, \"Unable to determine kernel major-minor level.\");\nexpected_kernel_major_minor = \"2.6\";\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, \"running kernel level \" + expected_kernel_major_minor + \", it is running kernel level \" + kernel_major_minor);\n\nflag = 0;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-2.6.32-431.23.3.el6\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-abi-whitelists-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-abi-whitelists-2.6.32-431.23.3.el6\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-debug-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-debug-2.6.32-431.23.3.el6\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-debug-devel-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-debug-devel-2.6.32-431.23.3.el6\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-devel-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-devel-2.6.32-431.23.3.el6\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-doc-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-doc-2.6.32-431.23.3.el6\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-firmware-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-firmware-2.6.32-431.23.3.el6\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-headers-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-headers-2.6.32-431.23.3.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"perf-2.6.32-431.23.3.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"python-perf-2.6.32-431.23.3.el6\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"affected kernel\");\n}\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T13:14:47", "description": "Updated kernel packages that fix multiple security issues, several\nbugs, and add one enhancement are now available for Red Hat Enterprise\nLinux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A use-after-free flaw was found in the way the ping_init_sock()\nfunction of the Linux kernel handled the group_info reference counter.\nA local, unprivileged user could use this flaw to crash the system or,\npotentially, escalate their privileges on the system. (CVE-2014-2851,\nImportant)\n\n* A NULL pointer dereference flaw was found in the way the\nfutex_wait_requeue_pi() function of the Linux kernel's futex subsystem\nhandled the requeuing of certain Priority Inheritance (PI) futexes. A\nlocal, unprivileged user could use this flaw to crash the system.\n(CVE-2012-6647, Moderate)\n\n* A NULL pointer dereference flaw was found in the\nrds_ib_laddr_check() function in the Linux kernel's implementation of\nReliable Datagram Sockets (RDS). A local, unprivileged user could use\nthis flaw to crash the system. (CVE-2013-7339, Moderate)\n\n* It was found that a remote attacker could use a race condition flaw\nin the ath_tx_aggr_sleep() function to crash the system by creating\nlarge network traffic on the system's Atheros 9k wireless network\nadapter. (CVE-2014-2672, Moderate)\n\n* A NULL pointer dereference flaw was found in the\nrds_iw_laddr_check() function in the Linux kernel's implementation of\nReliable Datagram Sockets (RDS). A local, unprivileged user could use\nthis flaw to crash the system. (CVE-2014-2678, Moderate)\n\n* A race condition flaw was found in the way the Linux kernel's\nmac80211 subsystem implementation handled synchronization between TX\nand STA wake-up code paths. A remote attacker could use this flaw to\ncrash the system. (CVE-2014-2706, Moderate)\n\n* An out-of-bounds memory access flaw was found in the Netlink\nAttribute extension of the Berkeley Packet Filter (BPF) interpreter\nfunctionality in the Linux kernel's networking implementation. A\nlocal, unprivileged user could use this flaw to crash the system or\nleak kernel memory to user space via a specially crafted socket\nfilter. (CVE-2014-3144, CVE-2014-3145, Moderate)\n\nThis update also fixes several bugs and adds one enhancement.\nDocumentation for these changes will be available shortly from the\nTechnical Notes document linked to in the References section.\n\nAll kernel users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues and add this\nenhancement. The system must be rebooted for this update to take\neffect.", "edition": 27, "published": "2014-07-30T00:00:00", "title": "RHEL 6 : kernel (RHSA-2014:0981)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-2672", "CVE-2012-6647", "CVE-2014-3145", "CVE-2013-7339", "CVE-2014-2851", "CVE-2014-2678", "CVE-2014-3144", "CVE-2014-2706"], "modified": "2014-07-30T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:python-perf-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump", "cpe:/o:redhat:enterprise_linux:6.5", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-s390x", "p-cpe:/a:redhat:enterprise_linux:kernel-firmware", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-debug", "p-cpe:/a:redhat:enterprise_linux:kernel-headers", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel", "p-cpe:/a:redhat:enterprise_linux:perf-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel", "p-cpe:/a:redhat:enterprise_linux:python-perf", "cpe:/o:redhat:enterprise_linux:6", "p-cpe:/a:redhat:enterprise_linux:perf", "p-cpe:/a:redhat:enterprise_linux:kernel-doc", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-i686"], "id": "REDHAT-RHSA-2014-0981.NASL", "href": "https://www.tenable.com/plugins/nessus/76908", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2014:0981. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(76908);\n script_version(\"1.22\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2012-6647\", \"CVE-2013-7339\", \"CVE-2014-2672\", \"CVE-2014-2678\", \"CVE-2014-2706\", \"CVE-2014-2851\", \"CVE-2014-3144\", \"CVE-2014-3145\");\n script_bugtraq_id(66351, 66492, 66543, 66591, 66779, 67309, 67321, 67395);\n script_xref(name:\"RHSA\", value:\"2014:0981\");\n\n script_name(english:\"RHEL 6 : kernel (RHSA-2014:0981)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix multiple security issues, several\nbugs, and add one enhancement are now available for Red Hat Enterprise\nLinux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A use-after-free flaw was found in the way the ping_init_sock()\nfunction of the Linux kernel handled the group_info reference counter.\nA local, unprivileged user could use this flaw to crash the system or,\npotentially, escalate their privileges on the system. (CVE-2014-2851,\nImportant)\n\n* A NULL pointer dereference flaw was found in the way the\nfutex_wait_requeue_pi() function of the Linux kernel's futex subsystem\nhandled the requeuing of certain Priority Inheritance (PI) futexes. A\nlocal, unprivileged user could use this flaw to crash the system.\n(CVE-2012-6647, Moderate)\n\n* A NULL pointer dereference flaw was found in the\nrds_ib_laddr_check() function in the Linux kernel's implementation of\nReliable Datagram Sockets (RDS). A local, unprivileged user could use\nthis flaw to crash the system. (CVE-2013-7339, Moderate)\n\n* It was found that a remote attacker could use a race condition flaw\nin the ath_tx_aggr_sleep() function to crash the system by creating\nlarge network traffic on the system's Atheros 9k wireless network\nadapter. (CVE-2014-2672, Moderate)\n\n* A NULL pointer dereference flaw was found in the\nrds_iw_laddr_check() function in the Linux kernel's implementation of\nReliable Datagram Sockets (RDS). A local, unprivileged user could use\nthis flaw to crash the system. (CVE-2014-2678, Moderate)\n\n* A race condition flaw was found in the way the Linux kernel's\nmac80211 subsystem implementation handled synchronization between TX\nand STA wake-up code paths. A remote attacker could use this flaw to\ncrash the system. (CVE-2014-2706, Moderate)\n\n* An out-of-bounds memory access flaw was found in the Netlink\nAttribute extension of the Berkeley Packet Filter (BPF) interpreter\nfunctionality in the Linux kernel's networking implementation. A\nlocal, unprivileged user could use this flaw to crash the system or\nleak kernel memory to user space via a specially crafted socket\nfilter. (CVE-2014-3144, CVE-2014-3145, Moderate)\n\nThis update also fixes several bugs and adds one enhancement.\nDocumentation for these changes will be available shortly from the\nTechnical Notes document linked to in the References section.\n\nAll kernel users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues and add this\nenhancement. The system must be rebooted for this update to take\neffect.\"\n );\n # https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b5caa05f\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2014:0981\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2013-7339\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-2672\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-2678\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-2706\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-2851\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-3144\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-3145\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2012-6647\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-i686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-s390x\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/03/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/07/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/07/30\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2012-6647\", \"CVE-2013-7339\", \"CVE-2014-2672\", \"CVE-2014-2678\", \"CVE-2014-2706\", \"CVE-2014-2851\", \"CVE-2014-3144\", \"CVE-2014-3145\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2014:0981\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2014:0981\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"kernel-abi-whitelists-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-debug-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-debug-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-debug-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-debug-debuginfo-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-debug-debuginfo-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-debug-debuginfo-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-debug-devel-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-debug-devel-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-debug-devel-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-debuginfo-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-debuginfo-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-debuginfo-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-debuginfo-common-i686-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-debuginfo-common-s390x-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-debuginfo-common-x86_64-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-devel-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-devel-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-devel-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"kernel-doc-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"kernel-firmware-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-headers-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-headers-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-headers-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-kdump-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-kdump-debuginfo-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-kdump-devel-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"perf-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"perf-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"perf-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"perf-debuginfo-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"perf-debuginfo-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"perf-debuginfo-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"python-perf-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"python-perf-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"python-perf-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"python-perf-debuginfo-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"python-perf-debuginfo-2.6.32-431.23.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"python-perf-debuginfo-2.6.32-431.23.3.el6\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-abi-whitelists / kernel-debug / etc\");\n }\n}\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T13:14:25", "description": "Updated kernel-rt packages that fix multiple security issues are now\navailable for Red Hat Enterprise MRG 2.5.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\n * A race condition leading to a use-after-free flaw was\n found in the way the Linux kernel's TCP/IP protocol\n suite implementation handled the addition of fragments\n to the LRU (Last-Recently Used) list under certain\n conditions. A remote attacker could use this flaw to\n crash the system or, potentially, escalate their\n privileges on the system by sending a large amount of\n specially crafted fragmented packets to that system.\n (CVE-2014-0100, Important)\n\n * A race condition flaw, leading to heap-based buffer\n overflows, was found in the way the Linux kernel's N_TTY\n line discipline (LDISC) implementation handled\n concurrent processing of echo output and TTY write\n operations originating from user space when the\n underlying TTY driver was PTY. An unprivileged, local\n user could use this flaw to crash the system or,\n potentially, escalate their privileges on the system.\n (CVE-2014-0196, Important)\n\n * A flaw was found in the way the Linux kernel's floppy\n driver handled user space provided data in certain error\n code paths while processing FDRAWCMD IOCTL commands. A\n local user with write access to /dev/fdX could use this\n flaw to free (using the kfree() function) arbitrary\n kernel memory. (CVE-2014-1737, Important)\n\n * It was found that the Linux kernel's floppy driver\n leaked internal kernel memory addresses to user space\n during the processing of the FDRAWCMD IOCTL command. A\n local user with write access to /dev/fdX could use this\n flaw to obtain information about the kernel heap\n arrangement. (CVE-2014-1738, Low)\n\nNote: A local user with write access to /dev/fdX could use these two\nflaws (CVE-2014-1737 in combination with CVE-2014-1738) to escalate\ntheir privileges on the system.\n\n * A use-after-free flaw was found in the way the\n ping_init_sock() function of the Linux kernel handled\n the group_info reference counter. A local, unprivileged\n user could use this flaw to crash the system or,\n potentially, escalate their privileges on the system.\n (CVE-2014-2851, Important)\n\n * It was found that a remote attacker could use a race\n condition flaw in the ath_tx_aggr_sleep() function to\n crash the system by creating large network traffic on\n the system's Atheros 9k wireless network adapter.\n (CVE-2014-2672, Moderate)\n\n * A NULL pointer dereference flaw was found in the\n rds_iw_laddr_check() function in the Linux kernel's\n implementation of Reliable Datagram Sockets (RDS). A\n local, unprivileged user could use this flaw to crash\n the system. (CVE-2014-2678, Moderate)\n\n * A race condition flaw was found in the way the Linux\n kernel's mac80211 subsystem implementation handled\n synchronization between TX and STA wake-up code paths.\n A remote attacker could use this flaw to crash the\n system. (CVE-2014-2706, Moderate)\n\n * It was found that the try_to_unmap_cluster() function in\n the Linux kernel's Memory Managment subsystem did not\n properly handle page locking in certain cases, which\n could potentially trigger the BUG_ON() macro in the\n mlock_vma_page() function. A local, unprivileged user\n could use this flaw to crash the system. (CVE-2014-3122,\n Moderate)\n\nUsers are advised to upgrade to these updated packages, which upgrade\nthe kernel-rt kernel to version kernel-rt-3.10.33-rt32.34 and correct\nthese issues. The system must be rebooted for this update to take\neffect.", "edition": 25, "cvss3": {"score": 8.1, "vector": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2014-07-22T00:00:00", "title": "RHEL 6 : MRG (RHSA-2014:0557)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3122", "CVE-2014-2672", "CVE-2014-0100", "CVE-2014-1737", "CVE-2014-1738", "CVE-2014-0196", "CVE-2014-2851", "CVE-2014-2678", "CVE-2014-2706"], "modified": "2014-07-22T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-vanilla", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-vanilla-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-doc", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debuginfo-common-x86_64", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-vanilla-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-firmware", "p-cpe:/a:redhat:enterprise_linux:kernel-rt", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debuginfo", "cpe:/o:redhat:enterprise_linux:6", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace-debuginfo"], "id": "REDHAT-RHSA-2014-0557.NASL", "href": "https://www.tenable.com/plugins/nessus/76677", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2014:0557. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(76677);\n script_version(\"1.18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\n \"CVE-2014-0100\",\n \"CVE-2014-0196\",\n \"CVE-2014-1737\",\n \"CVE-2014-1738\",\n \"CVE-2014-2672\",\n \"CVE-2014-2678\",\n \"CVE-2014-2706\",\n \"CVE-2014-2851\",\n \"CVE-2014-3122\"\n );\n script_bugtraq_id(\n 65952,\n 66492,\n 66543,\n 66591,\n 66779,\n 67162,\n 67282,\n 67300,\n 67302\n );\n script_xref(name:\"RHSA\", value:\"2014:0557\");\n\n script_name(english:\"RHEL 6 : MRG (RHSA-2014:0557)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Red Hat host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"Updated kernel-rt packages that fix multiple security issues are now\navailable for Red Hat Enterprise MRG 2.5.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\n * A race condition leading to a use-after-free flaw was\n found in the way the Linux kernel's TCP/IP protocol\n suite implementation handled the addition of fragments\n to the LRU (Last-Recently Used) list under certain\n conditions. A remote attacker could use this flaw to\n crash the system or, potentially, escalate their\n privileges on the system by sending a large amount of\n specially crafted fragmented packets to that system.\n (CVE-2014-0100, Important)\n\n * A race condition flaw, leading to heap-based buffer\n overflows, was found in the way the Linux kernel's N_TTY\n line discipline (LDISC) implementation handled\n concurrent processing of echo output and TTY write\n operations originating from user space when the\n underlying TTY driver was PTY. An unprivileged, local\n user could use this flaw to crash the system or,\n potentially, escalate their privileges on the system.\n (CVE-2014-0196, Important)\n\n * A flaw was found in the way the Linux kernel's floppy\n driver handled user space provided data in certain error\n code paths while processing FDRAWCMD IOCTL commands. A\n local user with write access to /dev/fdX could use this\n flaw to free (using the kfree() function) arbitrary\n kernel memory. (CVE-2014-1737, Important)\n\n * It was found that the Linux kernel's floppy driver\n leaked internal kernel memory addresses to user space\n during the processing of the FDRAWCMD IOCTL command. A\n local user with write access to /dev/fdX could use this\n flaw to obtain information about the kernel heap\n arrangement. (CVE-2014-1738, Low)\n\nNote: A local user with write access to /dev/fdX could use these two\nflaws (CVE-2014-1737 in combination with CVE-2014-1738) to escalate\ntheir privileges on the system.\n\n * A use-after-free flaw was found in the way the\n ping_init_sock() function of the Linux kernel handled\n the group_info reference counter. A local, unprivileged\n user could use this flaw to crash the system or,\n potentially, escalate their privileges on the system.\n (CVE-2014-2851, Important)\n\n * It was found that a remote attacker could use a race\n condition flaw in the ath_tx_aggr_sleep() function to\n crash the system by creating large network traffic on\n the system's Atheros 9k wireless network adapter.\n (CVE-2014-2672, Moderate)\n\n * A NULL pointer dereference flaw was found in the\n rds_iw_laddr_check() function in the Linux kernel's\n implementation of Reliable Datagram Sockets (RDS). A\n local, unprivileged user could use this flaw to crash\n the system. (CVE-2014-2678, Moderate)\n\n * A race condition flaw was found in the way the Linux\n kernel's mac80211 subsystem implementation handled\n synchronization between TX and STA wake-up code paths.\n A remote attacker could use this flaw to crash the\n system. (CVE-2014-2706, Moderate)\n\n * It was found that the try_to_unmap_cluster() function in\n the Linux kernel's Memory Managment subsystem did not\n properly handle page locking in certain cases, which\n could potentially trigger the BUG_ON() macro in the\n mlock_vma_page() function. A local, unprivileged user\n could use this flaw to crash the system. (CVE-2014-3122,\n Moderate)\n\nUsers are advised to upgrade to these updated packages, which upgrade\nthe kernel-rt kernel to version kernel-rt-3.10.33-rt32.34 and correct\nthese issues. The system must be rebooted for this update to take\neffect.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.redhat.com/security/data/cve/CVE-2014-0100.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.redhat.com/security/data/cve/CVE-2014-0196.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.redhat.com/security/data/cve/CVE-2014-1737.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.redhat.com/security/data/cve/CVE-2014-1738.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.redhat.com/security/data/cve/CVE-2014-2672.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.redhat.com/security/data/cve/CVE-2014-2678.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.redhat.com/security/data/cve/CVE-2014-2706.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.redhat.com/security/data/cve/CVE-2014-2851.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.redhat.com/security/data/cve/CVE-2014-3122.html\");\n script_set_attribute(attribute:\"see_also\", value:\"http://rhn.redhat.com/errata/RHSA-2014-0557.html\");\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/02/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/05/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/07/22\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-vanilla-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-vanilla-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2021 Tenable Network Security, Inc.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = eregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2014:0557\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n\n if (! (rpm_exists(release:\"RHEL6\", rpm:\"mrg-release\"))) audit(AUDIT_PACKAGE_NOT_INSTALLED, \"MRG\");\n\n if (! rpm_exists(release:\"RHEL6\", rpm:\"kernel-rt-3.10.0-\") && rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-rt-3.10.33-rt32.34.el6rt\")) flag++;\n if (! rpm_exists(release:\"RHEL6\", rpm:\"kernel-rt-debug-3.10.0-\") && rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-rt-debug-3.10.33-rt32.34.el6rt\")) flag++;\n if (! rpm_exists(release:\"RHEL6\", rpm:\"kernel-rt-debug-debuginfo-3.10.0-\") && rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-rt-debug-debuginfo-3.10.33-rt32.34.el6rt\")) flag++;\n if (! rpm_exists(release:\"RHEL6\", rpm:\"kernel-rt-debug-devel-3.10.0-\") && rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-rt-debug-devel-3.10.33-rt32.34.el6rt\")) flag++;\n if (! rpm_exists(release:\"RHEL6\", rpm:\"kernel-rt-debuginfo-3.10.0-\") && rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-rt-debuginfo-3.10.33-rt32.34.el6rt\")) flag++;\n if (! rpm_exists(release:\"RHEL6\", rpm:\"kernel-rt-debuginfo-common-x86_64-3.10.0-\") && rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-rt-debuginfo-common-x86_64-3.10.33-rt32.34.el6rt\")) flag++;\n if (! rpm_exists(release:\"RHEL6\", rpm:\"kernel-rt-devel-3.10.0-\") && rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-rt-devel-3.10.33-rt32.34.el6rt\")) flag++;\n if (! rpm_exists(release:\"RHEL6\", rpm:\"kernel-rt-doc-3.10.0-\") && rpm_check(release:\"RHEL6\", reference:\"kernel-rt-doc-3.10.33-rt32.34.el6rt\")) flag++;\n if (! rpm_exists(release:\"RHEL6\", rpm:\"kernel-rt-firmware-3.10.0-\") && rpm_check(release:\"RHEL6\", reference:\"kernel-rt-firmware-3.10.33-rt32.34.el6rt\")) flag++;\n if (! rpm_exists(release:\"RHEL6\", rpm:\"kernel-rt-trace-3.10.0-\") && rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-rt-trace-3.10.33-rt32.34.el6rt\")) flag++;\n if (! rpm_exists(release:\"RHEL6\", rpm:\"kernel-rt-trace-debuginfo-3.10.0-\") && rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-rt-trace-debuginfo-3.10.33-rt32.34.el6rt\")) flag++;\n if (! rpm_exists(release:\"RHEL6\", rpm:\"kernel-rt-trace-devel-3.10.0-\") && rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-rt-trace-devel-3.10.33-rt32.34.el6rt\")) flag++;\n if (! rpm_exists(release:\"RHEL6\", rpm:\"kernel-rt-vanilla-3.10.0-\") && rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-rt-vanilla-3.10.33-rt32.34.el6rt\")) flag++;\n if (! rpm_exists(release:\"RHEL6\", rpm:\"kernel-rt-vanilla-debuginfo-3.10.0-\") && rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-rt-vanilla-debuginfo-3.10.33-rt32.34.el6rt\")) flag++;\n if (! rpm_exists(release:\"RHEL6\", rpm:\"kernel-rt-vanilla-devel-3.10.0-\") && rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-rt-vanilla-devel-3.10.33-rt32.34.el6rt\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel-rt / kernel-rt-debug / kernel-rt-debug-debuginfo / etc\");\n }\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-09-23T18:53:58", "description": "Matthew Daley reported an information leak in the floppy disk driver\nof the Linux kernel. An unprivileged local user could exploit this\nflaw to obtain potentially sensitive information from kernel memory.\n(CVE-2014-1738)\n\nMatthew Daley reported a flaw in the handling of ioctl commands by the\nfloppy disk driver in the Linux kernel. An unprivileged local user\ncould exploit this flaw to gain administrative privileges if the\nfloppy disk module is loaded. (CVE-2014-1737)\n\nA flaw was discovered in the Linux kernel's IPC reference counting. An\nunprivileged local user could exploit this flaw to cause a denial of\nservice (OOM system crash). (CVE-2013-4483)\n\nAl Viro discovered an error in how CIFS in the Linux kernel handles\nuncached write operations. An unprivileged local user could exploit\nthis flaw to cause a denial of service (system crash), obtain\nsensitive information from kernel memory, or possibly gain privileges.\n(CVE-2014-0069)\n\nA flaw was discovered in the handling of network packets when\nmergeable buffers are disabled for virtual machines in the Linux\nkernel. Guest OS users may exploit this flaw to cause a denial of\nservice (host OS crash) or possibly gain privilege on the host OS.\n(CVE-2014-0077)\n\nA flaw was discovered in the Linux kernel's handling of the SCTP\nhandshake. A remote attacker could exploit this flaw to cause a denial\nof service (system crash). (CVE-2014-0101)\n\nA flaw was discovered in the handling of routing information in Linux\nkernel's IPv6 stack. A remote attacker could exploit this flaw to\ncause a denial of service (memory consumption) via a flood of ICMPv6\nrouter advertisement packets. (CVE-2014-2309)\n\nAn error was discovered in the Linux kernel's DCCP protocol support. A\nremote attacked could exploit this flaw to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2014-2523)\n\nMax Sydorenko discovered a race condition in the Atheros 9k wireless\ndriver in the Linux kernel. This race could be exploited by remote\nattackers to cause a denial of service (system crash). (CVE-2014-2672)\n\nAn error was discovered in the Reliable Datagram Sockets (RDS)\nprotocol stack in the Linux kernel. A local user could exploit this\nflaw to cause a denial of service (system crash) or possibly have\nunspecified other impact. (CVE-2014-2678)\n\nYaara Rozenblum discovered a race condition in the Linux kernel's\nGeneric IEEE 802.11 Networking Stack (mac80211). Remote attackers\ncould exploit this flaw to cause a denial of service (system crash).\n(CVE-2014-2706)\n\nA flaw was discovered in the Linux kernel's ping sockets. An\nunprivileged local user could exploit this flaw to cause a denial of\nservice (system crash) or possibly gain privileges via a crafted\napplication. (CVE-2014-2851).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 23, "published": "2014-05-27T00:00:00", "title": "Ubuntu 12.04 LTS : linux vulnerabilities (USN-2221-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-2672", "CVE-2014-1737", "CVE-2014-1738", "CVE-2014-2851", "CVE-2014-2309", "CVE-2014-2678", "CVE-2013-4483", "CVE-2014-0077", "CVE-2014-2523", "CVE-2014-0101", "CVE-2014-0069", "CVE-2014-2706"], "modified": "2014-05-27T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-virtual", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-generic-pae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-highbank", "cpe:/o:canonical:ubuntu_linux:12.04:-:lts"], "id": "UBUNTU_USN-2221-1.NASL", "href": "https://www.tenable.com/plugins/nessus/74184", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2221-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(74184);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/09/22\");\n\n script_cve_id(\"CVE-2013-4483\", \"CVE-2014-0069\", \"CVE-2014-0077\", \"CVE-2014-0101\", \"CVE-2014-1737\", \"CVE-2014-1738\", \"CVE-2014-2309\", \"CVE-2014-2523\", \"CVE-2014-2672\", \"CVE-2014-2678\", \"CVE-2014-2706\", \"CVE-2014-2851\");\n script_bugtraq_id(63445, 65588, 65943, 66095, 66279, 66492, 66543, 66591, 66678, 66779, 67300, 67302);\n script_xref(name:\"USN\", value:\"2221-1\");\n\n script_name(english:\"Ubuntu 12.04 LTS : linux vulnerabilities (USN-2221-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Matthew Daley reported an information leak in the floppy disk driver\nof the Linux kernel. An unprivileged local user could exploit this\nflaw to obtain potentially sensitive information from kernel memory.\n(CVE-2014-1738)\n\nMatthew Daley reported a flaw in the handling of ioctl commands by the\nfloppy disk driver in the Linux kernel. An unprivileged local user\ncould exploit this flaw to gain administrative privileges if the\nfloppy disk module is loaded. (CVE-2014-1737)\n\nA flaw was discovered in the Linux kernel's IPC reference counting. An\nunprivileged local user could exploit this flaw to cause a denial of\nservice (OOM system crash). (CVE-2013-4483)\n\nAl Viro discovered an error in how CIFS in the Linux kernel handles\nuncached write operations. An unprivileged local user could exploit\nthis flaw to cause a denial of service (system crash), obtain\nsensitive information from kernel memory, or possibly gain privileges.\n(CVE-2014-0069)\n\nA flaw was discovered in the handling of network packets when\nmergeable buffers are disabled for virtual machines in the Linux\nkernel. Guest OS users may exploit this flaw to cause a denial of\nservice (host OS crash) or possibly gain privilege on the host OS.\n(CVE-2014-0077)\n\nA flaw was discovered in the Linux kernel's handling of the SCTP\nhandshake. A remote attacker could exploit this flaw to cause a denial\nof service (system crash). (CVE-2014-0101)\n\nA flaw was discovered in the handling of routing information in Linux\nkernel's IPv6 stack. A remote attacker could exploit this flaw to\ncause a denial of service (memory consumption) via a flood of ICMPv6\nrouter advertisement packets. (CVE-2014-2309)\n\nAn error was discovered in the Linux kernel's DCCP protocol support. A\nremote attacked could exploit this flaw to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2014-2523)\n\nMax Sydorenko discovered a race condition in the Atheros 9k wireless\ndriver in the Linux kernel. This race could be exploited by remote\nattackers to cause a denial of service (system crash). (CVE-2014-2672)\n\nAn error was discovered in the Reliable Datagram Sockets (RDS)\nprotocol stack in the Linux kernel. A local user could exploit this\nflaw to cause a denial of service (system crash) or possibly have\nunspecified other impact. (CVE-2014-2678)\n\nYaara Rozenblum discovered a race condition in the Linux kernel's\nGeneric IEEE 802.11 Networking Stack (mac80211). Remote attackers\ncould exploit this flaw to cause a denial of service (system crash).\n(CVE-2014-2706)\n\nA flaw was discovered in the Linux kernel's ping sockets. An\nunprivileged local user could exploit this flaw to cause a denial of\nservice (system crash) or possibly gain privileges via a crafted\napplication. (CVE-2014-2851).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/2221-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-generic-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-highbank\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-virtual\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.04:-:lts\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/11/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/05/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/05/27\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2014-2020 Canonical, Inc. / NASL script (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"ksplice.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(12\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 12.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2013-4483\", \"CVE-2014-0069\", \"CVE-2014-0077\", \"CVE-2014-0101\", \"CVE-2014-1737\", \"CVE-2014-1738\", \"CVE-2014-2309\", \"CVE-2014-2523\", \"CVE-2014-2672\", \"CVE-2014-2678\", \"CVE-2014-2706\", \"CVE-2014-2851\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for USN-2221-1\");\n }\n else\n {\n _ubuntu_report = ksplice_reporting_text();\n }\n}\n\nflag = 0;\n\nif (ubuntu_check(osver:\"12.04\", pkgname:\"linux-image-3.2.0-63-generic\", pkgver:\"3.2.0-63.95\")) flag++;\nif (ubuntu_check(osver:\"12.04\", pkgname:\"linux-image-3.2.0-63-generic-pae\", pkgver:\"3.2.0-63.95\")) flag++;\nif (ubuntu_check(osver:\"12.04\", pkgname:\"linux-image-3.2.0-63-highbank\", pkgver:\"3.2.0-63.95\")) flag++;\nif (ubuntu_check(osver:\"12.04\", pkgname:\"linux-image-3.2.0-63-virtual\", pkgver:\"3.2.0-63.95\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-image-3.2-generic / linux-image-3.2-generic-pae / etc\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:38:44", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3145", "CVE-2014-3144", "CVE-2014-2706"], "description": "kernel-uek\n[3.8.13-35.3.3.el7uek]\n- filter: prevent nla extensions to peek beyond the end of the message (Mathias Krause) [Orabug: 19315781] {CVE-2014-3144} {CVE-2014-3145}\n- mac80211: fix AP powersave TX vs. wakeup race (Emmanuel Grumbach) [Orabug: 19316457] {CVE-2014-2706}", "edition": 4, "modified": "2014-07-29T00:00:00", "published": "2014-07-29T00:00:00", "id": "ELSA-2014-3052", "href": "http://linux.oracle.com/errata/ELSA-2014-3052.html", "title": "unbreakable enterprise kernel security update", "type": "oraclelinux", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:39:05", "bulletinFamily": "unix", "cvelist": ["CVE-2014-2672", "CVE-2014-4699", "CVE-2014-4943", "CVE-2014-0206", "CVE-2014-3534", "CVE-2014-2673", "CVE-2014-0181", "CVE-2014-4667", "CVE-2014-2706"], "description": "[3.10.0-123.6.3]\r\n- Oracle Linux certificates (Alexey Petrenko)\r\n \n[3.10.0-123.6.3]\r\n- [net] l2tp_ppp: fail when socket option level is not SOL_PPPOL2TP (Petr Matousek) [1119465 1119466] {CVE-2014-4943}\r\n \n[3.10.0-123.6.2.el7]\r\n- [s390] ptrace: correct insufficient sanitization when setting psw mask (Hendrik Brueckner) [1114090 1113673]\r\n \n[3.10.0-123.6.1.el7]\r\n- [x86] ptrace: force IRET path after a ptrace_stop() (Oleg Nesterov) [1115934 1115935] {CVE-2014-4699}\r\n \n[3.10.0-123.5.1.el7]\r\n- [net] ipv4/tunnels: fix an oops when using ipip/sit with IPsec (Jiri Pirko) [1114957 1108857]\r\n- [scsi] Add timeout to avoid infinite command retry (Ewan Milne) [1114468 1061871]\r\n- [net] filter: let bpf_tell_extensions return SKF_AD_MAX (Jiri Benc) [1114404 1079524]\r\n- [net] filter: introduce SO_BPF_EXTENSIONS (Jiri Benc) [1114404 1079524]\r\n- [net] sctp: Fix sk_ack_backlog wrap-around problem (Daniel Borkmann) [1113971 1112726] {CVE-2014-4667}\r\n- [tty] Set correct tty name in 'active' sysfs attribute (Denys Vlasenko) [1113467 1066403]\r\n- [powerpc] tm: Disable IRQ in tm_recheckpoint (Larry Woodman) [1113150 1088224]\r\n- [scsi] qla2xxx: Update version number to 8.06.00.08.07.0-k3 (Chad Dupuis) [1112389 1090378]\r\n- [scsi] qla2xxx: Reduce the time we wait for a command to complete during SCSI error handling (Chad Dupuis) [11123\r\n89 1090378]\r\n- [scsi] qla2xxx: Clear loop_id for ports that are marked lost during fabric scanning (Chad Dupuis) [1112389 109037\r\n8]\r\n- [scsi] qla2xxx: Avoid escalating the SCSI error handler if the command is not found in firmware (Chad Dupuis) [11\r\n12389 1090378]\r\n- [scsi] qla2xxx: Don't check for firmware hung during the reset context for ISP82XX (Chad Dupuis) [1112389 1090378\r\n]\r\n- [scsi] qla2xxx: Issue abort command for outstanding commands during cleanup when only firmware is alive (Chad Dup\r\nuis) [1112389 1090378]\r\n- [fs] nfs: Apply NFS_MOUNT_CMP_FLAGMASK to nfs_compare_remount_data() (Scott Mayhew) [1109407 1103805]\r\n- [ethernet] bnx2x: Fix kernel crash and data miscompare after EEH recovery (Michal Schmidt) [1107721 1101808]\r\n- [net] gro: restore frag0 optimization (and fix crash) (Michal Schmidt) [1099950 1069741]\r\n- [watchdog] hpwdt: display informative string (Nigel Croxon) [1096961 1074038]\r\n- [net] Use netlink_ns_capable to verify the permisions of netlink messages (Jiri Benc) [1094271 1094272] {CVE-2014\r\n-0181}\r\n- [net] netlink: Add variants of capable for use on netlink messages (Jiri Benc) [1094271 1094272] {CVE-2014-0181}\r\n- [net] diag: Move the permission check in sock_diag_put_filterinfo to packet_diag_dump (Jiri Benc) [1094271 109427\r\n2] {CVE-2014-0181}\r\n- [net] netlink: Rename netlink_capable netlink_allowed (Jiri Benc) [1094271 1094272] {CVE-2014-0181}\r\n- [net] diag: Fix ns_capable check in sock_diag_put_filterinfo (Jiri Benc) [1094271 1094272] {CVE-2014-0181}\r\n- [net] netlink: Fix permission check in netlink_connect() (Jiri Benc) [1094271 1094272] {CVE-2014-0181}\r\n- [kernel] cputime: Fix jiffies based cputime assumption on steal accounting (Frederic Weisbecker) [1090974 1047732\r\n]\r\n- [kernel] cputime: Bring cputime -> nsecs conversion (Frederic Weisbecker) [1090974 1047732]\r\n- [kernel] cputime: Default implementation of nsecs -> cputime conversion (Frederic Weisbecker) [1090974 1047732]\r\n- [net] mac80211: fix crash due to AP powersave TX vs. wakeup race (Jacob Tanenbaum) [1083533 1083534] {CVE-2014-27\r\n06}\r\n- [wireless] ath9k: tid->sched race in ath_tx_aggr_sleep() (Jacob Tanenbaum) [1083251 1083252] {CVE-2014-2672}\r\n- [powerpc] tm: Fix crash when forking inside a transaction (Radomir Vrbovsky) [1083214 1083215] {CVE-2014-2673}\r\n- [fs] aio: fix plug memory disclosure and fix reqs_active accounting backport (Jeff Moyer) [1094604 1094605] {CVE-\r\n2014-0206}\r\n- [fs] aio: plug memory disclosure and fix reqs_active accounting (Mateusz Guzik) [1094604 1094605] {CVE-2014-0206}\r", "edition": 4, "modified": "2014-08-06T00:00:00", "published": "2014-08-06T00:00:00", "id": "ELSA-2014-1023", "href": "http://linux.oracle.com/errata/ELSA-2014-1023.html", "title": "kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:20", "bulletinFamily": "unix", "cvelist": ["CVE-2014-2672", "CVE-2012-6647", "CVE-2014-1737", "CVE-2014-4699", "CVE-2014-1738", "CVE-2014-4943", "CVE-2014-3145", "CVE-2013-7339", "CVE-2014-2851", "CVE-2014-2678", "CVE-2014-3144", "CVE-2014-3153", "CVE-2014-2706", "CVE-2014-0203"], "description": "[2.6.32-431.23.3]\n- [netdrv] pppol2tp: fail when socket option level is not SOL_PPPOL2TP [1119461 1119462] {CVE-2014-4943}\n[2.6.32-431.23.2]\n- [kernel] utrace: force IRET path after utrace_finish_vfork() (Oleg Nesterov) [1115932 1115933] {CVE-2014-4699}\n[2.6.32-431.23.1]\n- [net] ip_tunnel: fix ip_tunnel_find to return NULL in case the tunnel is not there (Jiri Pirko) [1107931 1104503]\n- [netdrv] bnx2x: Fix kernel crash and data miscompare after EEH recovery (Michal Schmidt) [1109269 1029600]\n- [netdrv] bnx2x: Adapter not recovery from EEH error injection (Michal Schmidt) [1109269 1029600]\n- [scsi] qla2xxx: Don't check for firmware hung during the reset context for ISP82XX (Chad Dupuis) [1110658 1054299]\n- [scsi] qla2xxx: Clear loop_id for ports that are marked lost during fabric scanning (Chad Dupuis) [1110658 1054299]\n- [scsi] qla2xxx: Issue abort command for outstanding commands during cleanup when only firmware is alive (Chad Dupuis) [1110658 1054299]\n- [scsi] qla2xxx: Reduce the time we wait for a command to complete during SCSI error handling (Chad Dupuis) [1110658 1054299]\n- [scsi] qla2xxx: Avoid escalating the SCSI error handler if the command is not found in firmware (Chad Dupuis) [1110658 1054299]\n- [scsi] qla2xxx: Set host can_queue value based on available resources (Chad Dupuis) [1110658 1054299]\n- [net] filter: prevent nla extensions to peek beyond the end of the message (Jiri Benc) [1096778 1096779] {CVE-2014-3144 CVE-2014-3145}\n- [net] bridge: add empty br_mdb_init() and br_mdb_uninit() definitions (Vlad Yasevich) [1106472 1097915]\n- [net] bridge: Correctly unregister MDB rtnetlink handlers (Vlad Yasevich) [1106472 1097915]\n- [net] rds: prevent dereference of a NULL device in rds_iw_laddr_check (Radomir Vrbovsky) [1083276 1083277] {CVE-2014-2678}\n- [s390] crypto: fix aes, des ctr mode concurrency finding (Hendrik Brueckner) [1110168 1096328]\n- [s390] crypto: fix des and des3_ede ctr concurrency issue (Hendrik Brueckner) [1109885 1065404]\n- [s390] crypto: fix des and des3_ede cbc concurrency issue (Hendrik Brueckner) [1109883 1065398]\n- [kernel] futex: Forbid uaddr == uaddr2 in futex_wait_requeue_pi() (Mateusz Guzik) [1097759 1097760] {CVE-2012-6647}\n- [libata] ahci: accommodate tag ordered controller (David Milburn) [1099725 1083748]\n- [net] mac80211: crash dues to AP powersave TX vs. wakeup race (Jacob Tanenbaum) [1083531 1083532] {CVE-2014-2706}\n- [netdrv] ath9k: tid->sched race in ath_tx_aggr_sleep() (Jacob Tanenbaum) [1083249 1083250] {CVE-2014-2672}\n- [kernel] hrtimer: Prevent all reprogramming if hang detected (Prarit Bhargava) [1096059 1075805]\n- [net] ipv4: current group_info should be put after using (Jiri Benc) [1087412 1087414] {CVE-2014-2851}\n- [kernel] tracing: Reset ring buffer when changing trace_clocks (Marcelo Tosatti) [1093984 1018138]\n- [net] rds: dereference of a NULL device (Jacob Tanenbaum) [1079218 1079219] {CVE-2013-7339}\n- [s390] crypto: fix concurrency issue in aes-ctr mode (Hendrik Brueckner) [1110169 1063478]\n- [net] ipv4: processing ancillary IP_TOS or IP_TTL (Francesco Fusco) [1094403 990694]\n- [net] ipv4: IP_TOS and IP_TTL can be specified as ancillary data (Francesco Fusco) [1094403 990694]\n- [s390] crypto: Fix aes-xts parameter corruption (Hendrik Brueckner) [1110170 1043540]\n- [fs] ext3: pass custom EOF to generic_file_llseek_size() (Eric Sandeen) [1103068 1007459]\n- [fs] ext4: use core vfs llseek code for dir seeks (Eric Sandeen) [1103068 1007459]\n- [fs] vfs: allow custom EOF in generic_file_llseek code (Eric Sandeen) [1103068 1007459]\n- [fs] ext3: return 32/64-bit dir name hash according to usage type (Eric Sandeen) [1103068 1007459]\n- [fs] ext4: replace cut'n'pasted llseek code with generic_file_llseek_size (Eric Sandeen) [1103068 1007459]\n- [fs] vfs: add generic_file_llseek_size (Eric Sandeen) [1103068 1007459]\n- [net] bridge: disable snooping if there is no querier (Vlad Yasevich) [1090749 1090670]\n- [net] Revert 'bridge: only expire the mdb entry when query is received' (Vlad Yasevich) [1090749 1090670]\n- [net] Revert 'bridge: fix some kernel warning in multicast timer' (Vlad Yasevich) [1090749 1090670]\n- [net] Revert 'bridge: do not call setup_timer() multiple times' (Vlad Yasevich) [1090749 1090670]\n- [net] Revert 'bridge: update mdb expiration timer upon reports' (Vlad Yasevich) [1090749 1090670]\n- [kernel] futex: Make lookup_pi_state more robust (Jerome Marchand) [1104516 1104517] {CVE-2014-3153}\n- [kernel] futex: Always cleanup owner tid in unlock_pi (Jerome Marchand) [1104516 1104517] {CVE-2014-3153}\n- [kernel] futex: Validate atomic acquisition in futex_lock_pi_atomic() (Jerome Marchand) [1104516 1104517] {CVE-2014-3153}\n- [kernel] futex: prevent requeue pi on same futex (Jerome Marchand) [1104516 1104517] {CVE-2014-3153}\n- [fs] autofs4: fix device ioctl mount lookup (Ian Kent) [1069630 999708]\n- [fs] vfs: introduce kern_path_mountpoint() (Ian Kent) [1069630 999708]\n- [fs] vfs: rename user_path_umountat() to user_path_mountpoint_at() (Ian Kent) [1069630 999708]\n- [fs] vfs: massage umount_lookup_last() a bit to reduce nesting (Ian Kent) [1069630 999708]\n- [fs] vfs: allow umount to handle mountpoints without revalidating them (Ian Kent) [1069630 999708]\n- Revert: [fs] vfs: allow umount to handle mountpoints without revalidating them (Ian Kent) [1069630 999708]\n- Revert: [fs] vfs: massage umount_lookup_last() a bit to reduce nesting (Ian Kent) [1069630 999708]\n- Revert: [fs] vfs: rename user_path_umountat() to user_path_mountpoint_at() (Ian Kent) [1069630 999708]\n- Revert: [fs] vfs: introduce kern_path_mountpoint() (Ian Kent) [1069630 999708]\n- Revert: [fs] autofs4: fix device ioctl mount lookup (Ian Kent) [1069630 999708]\n- [block] floppy: don't write kernel-only members to FDRAWCMD ioctl output (Denys Vlasenko) [1094308 1094310] {CVE-2014-1738 CVE-2014-1737}\n- [block] floppy: ignore kernel-only members in FDRAWCMD ioctl input (Denys Vlasenko) [1094308 1094310] {CVE-2014-1738 CVE-2014-1737}\n- [fs] vfs: fix autofs/afs/etc magic mountpoint breakage (Frantisek Hrbata) [1094370 1079347] {CVE-2014-0203}\n[2.6.32-431.22.1]\n- [fs] cifs: Check if prefixpath starts with '\\' in cifs_parse_mount_options (Sachin Prabhu) [1107503 1104268]\n- [virt] kvm: enable PCI multiple-segments for pass-through device (Michael S. Tsirkin) [1103972 1103471]\n- [fs] GFS2: Lock i_mutex and use a local gfs2_holder for fallocate (Robert S Peterson) [1102313 1061910]\n[2.6.32-431.21.1]\n- [kvm] mmu: fix incorrect check of guest cr4 bits (Bandan Das) [1103821 1007164]\n- [drm] nouveau: fix nasty bug which can clobber SOR0's clock setup (Ben Skeggs) [1100574 1095796]\n- [net] tcp: tsq: restore minimal amount of queueing (Jiri Pirko) [1103825 1044053]", "edition": 4, "modified": "2014-07-29T00:00:00", "published": "2014-07-29T00:00:00", "id": "ELSA-2014-0981", "href": "http://linux.oracle.com/errata/ELSA-2014-0981.html", "title": "kernel security, bug fix, and enhancement update", "type": "oraclelinux", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "redhat": [{"lastseen": "2019-08-13T18:44:53", "bulletinFamily": "unix", "cvelist": ["CVE-2013-7339", "CVE-2014-2672", "CVE-2014-2678", "CVE-2014-2706", "CVE-2014-2851"], "description": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A use-after-free flaw was found in the way the ping_init_sock() function\nof the Linux kernel handled the group_info reference counter. A local,\nunprivileged user could use this flaw to crash the system or, potentially,\nescalate their privileges on the system. (CVE-2014-2851, Important)\n\n* A NULL pointer dereference flaw was found in the rds_ib_laddr_check()\nfunction in the Linux kernel's implementation of Reliable Datagram Sockets\n(RDS). A local, unprivileged user could use this flaw to crash the system.\n(CVE-2013-7339, Moderate)\n\n* It was found that a remote attacker could use a race condition flaw in\nthe ath_tx_aggr_sleep() function to crash the system by creating large\nnetwork traffic on the system's Atheros 9k wireless network adapter.\n(CVE-2014-2672, Moderate)\n\n* A NULL pointer dereference flaw was found in the rds_iw_laddr_check()\nfunction in the Linux kernel's implementation of Reliable Datagram Sockets\n(RDS). A local, unprivileged user could use this flaw to crash the system.\n(CVE-2014-2678, Moderate)\n\n* A race condition flaw was found in the way the Linux kernel's mac80211\nsubsystem implementation handled synchronization between TX and STA wake-up\ncode paths. A remote attacker could use this flaw to crash the system.\n(CVE-2014-2706, Moderate)\n\nThis update also fixes the following bugs:\n\n* The Completely Fair Scheduler (CFS) did not verify whether the CFS\nperiod timer is running while throttling tasks on the CFS run queue.\nTherefore under certain circumstances, the CFS run queue became stuck\nbecause the CFS period timer was inactive and could not be restarted. To\nfix this problem, the CFS now restarts the CFS period timer inside the\nthrottling function if it is inactive. (BZ#1120666)\n\n* A previous change to the SCSI code fixed a race condition that could\noccur when removing a SCSI device. However, that change caused performance\ndegradation because it used a certain function from the block layer code\nthat was returning different values compared with later versions of the\nkernel. This update alters the SCSI code to properly utilize the values\nreturned by the block layer code. (BZ#1117581)\n\n* If a statically defined gateway became unreachable and its corresponding\nneighbor entry entered a FAILED state, the gateway stayed in the FAILED\nstate even after it became reachable again. This prevented routing of the\ntraffic through that gateway. This update allows probing such a gateway\nautomatically and routing the traffic through the gateway again once it\nbecomes reachable. (BZ#1115262)\n\n* A miscalculation in the \"radix_tree\" swap encoding corrupted swap area\nindexes bigger than 8 by truncating lower bits of swap entries.\nConsequently, systems with more than 8 swap areas could trigger a bogus\nOOM scenario when swapping out to such a swap area. This update fixes this\nproblem by reducing a return value of the SWP_TYPE_SHIFT() function and\nremoving a broken function call from the read_swap_header() function.\n(BZ#1099727)\n\n* The automatic route cache rebuilding feature could incorrectly compute\nthe length of a route hash chain if the cache contained multiple entries\nwith the same key but a different TOS, mark, or OIF bit. Consequently, the\nfeature could reach the rebuild limit and disable the routing cache on the\nsystem. This problem is fixed by using a helper function that avoids\ncounting such duplicate routes. (BZ#1113823)\n\n* When booting a guest in the Hyper-V environment and enough of\nProgrammable Interval Timer (PIT) interrupts were lost or not injected\ninto the guest on time, the kernel panicked and the guest failed to boot.\nThis problem has been fixed by bypassing the relevant PIT check when the\nguest is running under the Hyper-V environment. (BZ#1112225)\n\nAll kernel users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. The system must be\nrebooted for this update to take effect.\n", "modified": "2015-04-24T14:20:50", "published": "2014-08-27T04:00:00", "id": "RHSA-2014:1101", "href": "https://access.redhat.com/errata/RHSA-2014:1101", "type": "redhat", "title": "(RHSA-2014:1101) Important: kernel security and bug fix update", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-08-13T18:45:20", "bulletinFamily": "unix", "cvelist": ["CVE-2014-0181", "CVE-2014-2672", "CVE-2014-2673", "CVE-2014-2706", "CVE-2014-3534", "CVE-2014-4667"], "description": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* It was found that Linux kernel's ptrace subsystem did not properly\nsanitize the address-space-control bits when the program-status word (PSW)\nwas being set. On IBM S/390 systems, a local, unprivileged user could use\nthis flaw to set address-space-control bits to the kernel space, and thus\ngain read and write access to kernel memory. (CVE-2014-3534, Important)\n\n* It was found that the permission checks performed by the Linux kernel\nwhen a netlink message was received were not sufficient. A local,\nunprivileged user could potentially bypass these restrictions by passing a\nnetlink socket as stdout or stderr to a more privileged process and\naltering the output of this process. (CVE-2014-0181, Moderate)\n\n* It was found that a remote attacker could use a race condition flaw in\nthe ath_tx_aggr_sleep() function to crash the system by creating large\nnetwork traffic on the system's Atheros 9k wireless network adapter.\n(CVE-2014-2672, Moderate)\n\n* A flaw was found in the way the Linux kernel performed forking inside of\na transaction. A local, unprivileged user on a PowerPC system that supports\ntransactional memory could use this flaw to crash the system.\n(CVE-2014-2673, Moderate)\n\n* A race condition flaw was found in the way the Linux kernel's mac80211\nsubsystem implementation handled synchronization between TX and STA wake-up\ncode paths. A remote attacker could use this flaw to crash the system.\n(CVE-2014-2706, Moderate)\n\n* An integer underflow flaw was found in the way the Linux kernel's Stream\nControl Transmission Protocol (SCTP) implementation processed certain\nCOOKIE_ECHO packets. By sending a specially crafted SCTP packet, a remote\nattacker could use this flaw to prevent legitimate connections to a\nparticular SCTP server socket to be made. (CVE-2014-4667, Moderate)\n\nRed Hat would like to thank Martin Schwidefsky of IBM for reporting\nCVE-2014-3534, Andy Lutomirski for reporting CVE-2014-0181, and Gopal Reddy\nKodudula of Nokia Siemens Networks for reporting CVE-2014-4667.\n\nThis update also fixes the following bugs:\n\n* Due to a NULL pointer dereference bug in the IPIP and SIT tunneling code,\na kernel panic could be triggered when using IPIP or SIT tunnels with\nIPsec. This update restructures the related code to avoid a NULL pointer\ndereference and the kernel no longer panics when using IPIP or SIT tunnels\nwith IPsec. (BZ#1114957)\n\n* Previously, an IBM POWER8 system could terminate unexpectedly when the\nkernel received an IRQ while handling a transactional memory re-checkpoint\ncritical section. This update ensures that IRQs are disabled in this\nsituation and the problem no longer occurs. (BZ#1113150)\n\n* A missing read memory barrier, rmb(), in the bnx2x driver caused the\nkernel to crash under various circumstances. This problem has been fixed\nby adding an rmb() call to the relevant place in the bnx2x code.\n(BZ#1107721)\n\n* The hpwdt driver previously emitted a panic message that was misleading\non certain HP systems. This update ensures that upon a kernel panic, hpwdt\ndisplays information valid on all HP systems. (BZ#1096961)\n\n* The qla2xxx driver has been upgraded to version 8.06.00.08.07.0-k3,\nwhich provides a number of bug fixes over the previous version in order to\ncorrect various timeout problems with the mailbox commands. (BZ#1112389)\n\n* The SCSI mid-layer could retry an I/O operation indefinitely if a storage\narray repeatedly returned a CHECK CONDITION status to that I/O operation\nbut the sense data was invalid. This update fixes the problem by limiting\na time for which is such an I/O operation retried. (BZ#1114468)\n\nAll kernel users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. The system must be\nrebooted for this update to take effect.\n", "modified": "2018-04-12T03:32:54", "published": "2014-08-06T04:00:00", "id": "RHSA-2014:1023", "href": "https://access.redhat.com/errata/RHSA-2014:1023", "type": "redhat", "title": "(RHSA-2014:1023) Important: kernel security and bug fix update", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-13T18:46:20", "bulletinFamily": "unix", "cvelist": ["CVE-2012-6647", "CVE-2013-7339", "CVE-2014-2672", "CVE-2014-2678", "CVE-2014-2706", "CVE-2014-2851", "CVE-2014-3144", "CVE-2014-3145"], "description": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A use-after-free flaw was found in the way the ping_init_sock() function\nof the Linux kernel handled the group_info reference counter. A local,\nunprivileged user could use this flaw to crash the system or, potentially,\nescalate their privileges on the system. (CVE-2014-2851, Important)\n\n* A NULL pointer dereference flaw was found in the way the\nfutex_wait_requeue_pi() function of the Linux kernel's futex subsystem\nhandled the requeuing of certain Priority Inheritance (PI) futexes.\nA local, unprivileged user could use this flaw to crash the system.\n(CVE-2012-6647, Moderate)\n\n* A NULL pointer dereference flaw was found in the rds_ib_laddr_check()\nfunction in the Linux kernel's implementation of Reliable Datagram Sockets\n(RDS). A local, unprivileged user could use this flaw to crash the system.\n(CVE-2013-7339, Moderate)\n\n* It was found that a remote attacker could use a race condition flaw in\nthe ath_tx_aggr_sleep() function to crash the system by creating large\nnetwork traffic on the system's Atheros 9k wireless network adapter.\n(CVE-2014-2672, Moderate)\n\n* A NULL pointer dereference flaw was found in the rds_iw_laddr_check()\nfunction in the Linux kernel's implementation of Reliable Datagram Sockets\n(RDS). A local, unprivileged user could use this flaw to crash the system.\n(CVE-2014-2678, Moderate)\n\n* A race condition flaw was found in the way the Linux kernel's mac80211\nsubsystem implementation handled synchronization between TX and STA wake-up\ncode paths. A remote attacker could use this flaw to crash the system.\n(CVE-2014-2706, Moderate)\n\n* An out-of-bounds memory access flaw was found in the Netlink Attribute\nextension of the Berkeley Packet Filter (BPF) interpreter functionality in\nthe Linux kernel's networking implementation. A local, unprivileged user\ncould use this flaw to crash the system or leak kernel memory to user space\nvia a specially crafted socket filter. (CVE-2014-3144, CVE-2014-3145,\nModerate)\n\nThis update also fixes several bugs and adds one enhancement.\nDocumentation for these changes will be available shortly from the\nTechnical Notes document linked to in the References section.\n\nAll kernel users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues and add this\nenhancement. The system must be rebooted for this update to take effect.\n", "modified": "2018-06-06T20:24:25", "published": "2014-07-29T04:00:00", "id": "RHSA-2014:0981", "href": "https://access.redhat.com/errata/RHSA-2014:0981", "type": "redhat", "title": "(RHSA-2014:0981) Important: kernel security, bug fix, and enhancement update", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-08-13T18:46:37", "bulletinFamily": "unix", "cvelist": ["CVE-2014-0100", "CVE-2014-0196", "CVE-2014-1737", "CVE-2014-1738", "CVE-2014-2672", "CVE-2014-2678", "CVE-2014-2706", "CVE-2014-2851", "CVE-2014-3122"], "description": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A race condition leading to a use-after-free flaw was found in the way\nthe Linux kernel's TCP/IP protocol suite implementation handled the\naddition of fragments to the LRU (Last-Recently Used) list under certain\nconditions. A remote attacker could use this flaw to crash the system or,\npotentially, escalate their privileges on the system by sending a large\namount of specially crafted fragmented packets to that system.\n(CVE-2014-0100, Important)\n\n* A race condition flaw, leading to heap-based buffer overflows, was found\nin the way the Linux kernel's N_TTY line discipline (LDISC) implementation\nhandled concurrent processing of echo output and TTY write operations\noriginating from user space when the underlying TTY driver was PTY.\nAn unprivileged, local user could use this flaw to crash the system or,\npotentially, escalate their privileges on the system. (CVE-2014-0196,\nImportant)\n\n* A flaw was found in the way the Linux kernel's floppy driver handled user\nspace provided data in certain error code paths while processing FDRAWCMD\nIOCTL commands. A local user with write access to /dev/fdX could use this\nflaw to free (using the kfree() function) arbitrary kernel memory.\n(CVE-2014-1737, Important)\n\n* It was found that the Linux kernel's floppy driver leaked internal kernel\nmemory addresses to user space during the processing of the FDRAWCMD IOCTL\ncommand. A local user with write access to /dev/fdX could use this flaw to\nobtain information about the kernel heap arrangement. (CVE-2014-1738, Low)\n\nNote: A local user with write access to /dev/fdX could use these two flaws\n(CVE-2014-1737 in combination with CVE-2014-1738) to escalate their\nprivileges on the system.\n\n* A use-after-free flaw was found in the way the ping_init_sock() function\nof the Linux kernel handled the group_info reference counter. A local,\nunprivileged user could use this flaw to crash the system or, potentially,\nescalate their privileges on the system. (CVE-2014-2851, Important)\n\n* It was found that a remote attacker could use a race condition flaw in\nthe ath_tx_aggr_sleep() function to crash the system by creating large\nnetwork traffic on the system's Atheros 9k wireless network adapter.\n(CVE-2014-2672, Moderate)\n\n* A NULL pointer dereference flaw was found in the rds_iw_laddr_check()\nfunction in the Linux kernel's implementation of Reliable Datagram Sockets\n(RDS). A local, unprivileged user could use this flaw to crash the system.\n(CVE-2014-2678, Moderate)\n\n* A race condition flaw was found in the way the Linux kernel's mac80211\nsubsystem implementation handled synchronization between TX and STA wake-up\ncode paths. A remote attacker could use this flaw to crash the system.\n(CVE-2014-2706, Moderate)\n\n* It was found that the try_to_unmap_cluster() function in the Linux\nkernel's Memory Managment subsystem did not properly handle page locking in\ncertain cases, which could potentially trigger the BUG_ON() macro in the\nmlock_vma_page() function. A local, unprivileged user could use this flaw\nto crash the system. (CVE-2014-3122, Moderate)\n\nRed Hat would like to thank Matthew Daley for reporting CVE-2014-1737 and\nCVE-2014-1738. The CVE-2014-0100 issue was discovered by Nikolay\nAleksandrov of Red Hat.\n\nUsers are advised to upgrade to these updated packages, which upgrade the\nkernel-rt kernel to version kernel-rt-3.10.33-rt32.34 and correct these\nissues. The system must be rebooted for this update to take effect.\n", "modified": "2018-06-07T08:58:34", "published": "2014-05-27T04:00:00", "id": "RHSA-2014:0557", "href": "https://access.redhat.com/errata/RHSA-2014:0557", "type": "redhat", "title": "(RHSA-2014:0557) Important: kernel-rt security update", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-13T18:45:30", "bulletinFamily": "unix", "cvelist": ["CVE-2012-6647", "CVE-2013-7339", "CVE-2014-0205", "CVE-2014-0222", "CVE-2014-0223", "CVE-2014-2672", "CVE-2014-2678", "CVE-2014-2706", "CVE-2014-2851", "CVE-2014-3144", "CVE-2014-3145", "CVE-2014-3535", "CVE-2014-3917", "CVE-2014-4667"], "description": "The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes\neverything necessary to run and manage virtual machines: a subset of the\nRed Hat Enterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nA NULL pointer dereference flaw was found in the way the Linux kernel's\nnetworking implementation handled logging while processing certain invalid\npackets coming in via a VxLAN interface. A remote attacker could use this\nflaw to crash the system by sending a specially crafted packet to such an\ninterface. (CVE-2014-3535)\n\nTwo integer overflow flaws were found in the QEMU block driver for QCOW\nversion 1 disk images. A user able to alter the QEMU disk image files\nloaded by a guest could use either of these flaws to corrupt QEMU process\nmemory on the host, which could potentially result in arbitrary code\nexecution on the host with the privileges of the QEMU process.\n(CVE-2014-0222, CVE-2014-0223)\n\nRed Hat would like to thank NSA for reporting CVE-2014-0222 and \nCVE-2014-0223.\n\nThis update also fixes the following bug:\n\n* Previously, an updated version of Qlogic firmware was not supported in\nthe Red Hat Enterprise Virtualization Hypervisor 6.5 image and an error\nmessage returned when users were using a newer version of Qlogic firmware.\nThis update includes the latest Qlogic firmware package in the Red Hat\nEnterprise Virtualization Hypervisor 6.5 image so no firmware errors are\nreturned. (BZ#1135780)\n\nThis updated package also provides updated components that include fixes\nfor various security issues. These issues have no security impact on Red\nHat Enterprise Virtualization Hypervisor itself, however. The security\nfixes included in this update address the following CVE numbers:\n\nCVE-2012-6647, CVE-2013-7339, CVE-2014-2672, CVE-2014-2678, CVE-2014-2706,\nCVE-2014-2851, CVE-2014-3144, CVE-2014-3145, CVE-2014-0205, CVE-2014-3917,\nand CVE-2014-4667 (kernel issues)\n\nUsers of the Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package.\n", "modified": "2018-06-07T08:59:31", "published": "2014-09-09T04:00:00", "id": "RHSA-2014:1168", "href": "https://access.redhat.com/errata/RHSA-2014:1168", "type": "redhat", "title": "(RHSA-2014:1168) Important: rhev-hypervisor6 security and bug fix update", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "centos": [{"lastseen": "2019-12-20T18:25:53", "bulletinFamily": "unix", "cvelist": ["CVE-2014-2672", "CVE-2014-3534", "CVE-2014-2673", "CVE-2014-0181", "CVE-2014-4667", "CVE-2014-2706"], "description": "**CentOS Errata and Security Advisory** CESA-2014:1023\n\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* It was found that Linux kernel's ptrace subsystem did not properly\nsanitize the address-space-control bits when the program-status word (PSW)\nwas being set. On IBM S/390 systems, a local, unprivileged user could use\nthis flaw to set address-space-control bits to the kernel space, and thus\ngain read and write access to kernel memory. (CVE-2014-3534, Important)\n\n* It was found that the permission checks performed by the Linux kernel\nwhen a netlink message was received were not sufficient. A local,\nunprivileged user could potentially bypass these restrictions by passing a\nnetlink socket as stdout or stderr to a more privileged process and\naltering the output of this process. (CVE-2014-0181, Moderate)\n\n* It was found that a remote attacker could use a race condition flaw in\nthe ath_tx_aggr_sleep() function to crash the system by creating large\nnetwork traffic on the system's Atheros 9k wireless network adapter.\n(CVE-2014-2672, Moderate)\n\n* A flaw was found in the way the Linux kernel performed forking inside of\na transaction. A local, unprivileged user on a PowerPC system that supports\ntransactional memory could use this flaw to crash the system.\n(CVE-2014-2673, Moderate)\n\n* A race condition flaw was found in the way the Linux kernel's mac80211\nsubsystem implementation handled synchronization between TX and STA wake-up\ncode paths. A remote attacker could use this flaw to crash the system.\n(CVE-2014-2706, Moderate)\n\n* An integer underflow flaw was found in the way the Linux kernel's Stream\nControl Transmission Protocol (SCTP) implementation processed certain\nCOOKIE_ECHO packets. By sending a specially crafted SCTP packet, a remote\nattacker could use this flaw to prevent legitimate connections to a\nparticular SCTP server socket to be made. (CVE-2014-4667, Moderate)\n\nRed Hat would like to thank Martin Schwidefsky of IBM for reporting\nCVE-2014-3534, Andy Lutomirski for reporting CVE-2014-0181, and Gopal Reddy\nKodudula of Nokia Siemens Networks for reporting CVE-2014-4667.\n\nThis update also fixes the following bugs:\n\n* Due to a NULL pointer dereference bug in the IPIP and SIT tunneling code,\na kernel panic could be triggered when using IPIP or SIT tunnels with\nIPsec. This update restructures the related code to avoid a NULL pointer\ndereference and the kernel no longer panics when using IPIP or SIT tunnels\nwith IPsec. (BZ#1114957)\n\n* Previously, an IBM POWER8 system could terminate unexpectedly when the\nkernel received an IRQ while handling a transactional memory re-checkpoint\ncritical section. This update ensures that IRQs are disabled in this\nsituation and the problem no longer occurs. (BZ#1113150)\n\n* A missing read memory barrier, rmb(), in the bnx2x driver caused the\nkernel to crash under various circumstances. This problem has been fixed\nby adding an rmb() call to the relevant place in the bnx2x code.\n(BZ#1107721)\n\n* The hpwdt driver previously emitted a panic message that was misleading\non certain HP systems. This update ensures that upon a kernel panic, hpwdt\ndisplays information valid on all HP systems. (BZ#1096961)\n\n* The qla2xxx driver has been upgraded to version 8.06.00.08.07.0-k3,\nwhich provides a number of bug fixes over the previous version in order to\ncorrect various timeout problems with the mailbox commands. (BZ#1112389)\n\n* The SCSI mid-layer could retry an I/O operation indefinitely if a storage\narray repeatedly returned a CHECK CONDITION status to that I/O operation\nbut the sense data was invalid. This update fixes the problem by limiting\na time for which is such an I/O operation retried. (BZ#1114468)\n\nAll kernel users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. The system must be\nrebooted for this update to take effect.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2014-August/032513.html\n\n**Affected packages:**\nkernel\nkernel-abi-whitelists\nkernel-debug\nkernel-debug-devel\nkernel-devel\nkernel-doc\nkernel-headers\nkernel-tools\nkernel-tools-libs\nkernel-tools-libs-devel\nperf\npython-perf\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2014-1023.html", "edition": 3, "modified": "2014-08-06T23:41:07", "published": "2014-08-06T23:41:07", "href": "http://lists.centos.org/pipermail/centos-announce/2014-August/032513.html", "id": "CESA-2014:1023", "title": "kernel, perf, python security update", "type": "centos", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-12-20T18:27:37", "bulletinFamily": "unix", "cvelist": ["CVE-2014-2672", "CVE-2012-6647", "CVE-2014-3145", "CVE-2013-7339", "CVE-2014-2851", "CVE-2014-2678", "CVE-2014-3144", "CVE-2014-2706"], "description": "**CentOS Errata and Security Advisory** CESA-2014:0981\n\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A use-after-free flaw was found in the way the ping_init_sock() function\nof the Linux kernel handled the group_info reference counter. A local,\nunprivileged user could use this flaw to crash the system or, potentially,\nescalate their privileges on the system. (CVE-2014-2851, Important)\n\n* A NULL pointer dereference flaw was found in the way the\nfutex_wait_requeue_pi() function of the Linux kernel's futex subsystem\nhandled the requeuing of certain Priority Inheritance (PI) futexes.\nA local, unprivileged user could use this flaw to crash the system.\n(CVE-2012-6647, Moderate)\n\n* A NULL pointer dereference flaw was found in the rds_ib_laddr_check()\nfunction in the Linux kernel's implementation of Reliable Datagram Sockets\n(RDS). A local, unprivileged user could use this flaw to crash the system.\n(CVE-2013-7339, Moderate)\n\n* It was found that a remote attacker could use a race condition flaw in\nthe ath_tx_aggr_sleep() function to crash the system by creating large\nnetwork traffic on the system's Atheros 9k wireless network adapter.\n(CVE-2014-2672, Moderate)\n\n* A NULL pointer dereference flaw was found in the rds_iw_laddr_check()\nfunction in the Linux kernel's implementation of Reliable Datagram Sockets\n(RDS). A local, unprivileged user could use this flaw to crash the system.\n(CVE-2014-2678, Moderate)\n\n* A race condition flaw was found in the way the Linux kernel's mac80211\nsubsystem implementation handled synchronization between TX and STA wake-up\ncode paths. A remote attacker could use this flaw to crash the system.\n(CVE-2014-2706, Moderate)\n\n* An out-of-bounds memory access flaw was found in the Netlink Attribute\nextension of the Berkeley Packet Filter (BPF) interpreter functionality in\nthe Linux kernel's networking implementation. A local, unprivileged user\ncould use this flaw to crash the system or leak kernel memory to user space\nvia a specially crafted socket filter. (CVE-2014-3144, CVE-2014-3145,\nModerate)\n\nThis update also fixes several bugs and adds one enhancement.\nDocumentation for these changes will be available shortly from the\nTechnical Notes document linked to in the References section.\n\nAll kernel users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues and add this\nenhancement. The system must be rebooted for this update to take effect.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2014-July/032496.html\n\n**Affected packages:**\nkernel\nkernel-abi-whitelists\nkernel-debug\nkernel-debug-devel\nkernel-devel\nkernel-doc\nkernel-firmware\nkernel-headers\nperf\npython-perf\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2014-0981.html", "edition": 3, "modified": "2014-07-31T19:57:06", "published": "2014-07-31T19:57:06", "href": "http://lists.centos.org/pipermail/centos-announce/2014-July/032496.html", "id": "CESA-2014:0981", "title": "kernel, perf, python security update", "type": "centos", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}], "ubuntu": [{"lastseen": "2020-07-02T11:40:01", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3122", "CVE-2014-2672", "CVE-2014-1737", "CVE-2014-1738", "CVE-2014-2851", "CVE-2014-2309", "CVE-2014-2678", "CVE-2014-0055", "CVE-2014-0077", "CVE-2014-2523", "CVE-2014-0101", "CVE-2014-2706"], "description": "Matthew Daley reported an information leak in the floppy disk driver of the \nLinux kernel. An unprivileged local user could exploit this flaw to obtain \npotentially sensitive information from kernel memory. (CVE-2014-1738)\n\nMatthew Daley reported a flaw in the handling of ioctl commands by the \nfloppy disk driver in the Linux kernel. An unprivileged local user could \nexploit this flaw to gain administrative privileges if the floppy disk \nmodule is loaded. (CVE-2014-1737)\n\nA flaw was discovered in the vhost-net subsystem of the Linux kernel. Guest \nOS users could exploit this flaw to cause a denial of service (host OS \ncrash). (CVE-2014-0055)\n\nA flaw was discovered in the handling of network packets when mergeable \nbuffers are disabled for virtual machines in the Linux kernel. Guest OS \nusers may exploit this flaw to cause a denial of service (host OS crash) or \npossibly gain privilege on the host OS. (CVE-2014-0077)\n\nA flaw was discovered in the Linux kernel's handling of the SCTP handshake. \nA remote attacker could exploit this flaw to cause a denial of service \n(system crash). (CVE-2014-0101)\n\nA flaw was discovered in the handling of routing information in Linux \nkernel's IPv6 stack. A remote attacker could exploit this flaw to cause a \ndenial of service (memory consumption) via a flood of ICMPv6 router \nadvertisement packets. (CVE-2014-2309)\n\nAn error was discovered in the Linux kernel's DCCP protocol support. A \nremote attacked could exploit this flaw to cause a denial of service \n(system crash) or possibly execute arbitrary code. (CVE-2014-2523)\n\nMax Sydorenko discovered a race condition in the Atheros 9k wireless driver \nin the Linux kernel. This race could be exploited by remote attackers to \ncause a denial of service (system crash). (CVE-2014-2672)\n\nAn error was discovered in the Reliable Datagram Sockets (RDS) protocol \nstack in the Linux kernel. A local user could exploit this flaw to cause a \ndenial of service (system crash) or possibly have unspecified other impact. \n(CVE-2014-2678)\n\nYaara Rozenblum discovered a race condition in the Linux kernel's Generic \nIEEE 802.11 Networking Stack (mac80211). Remote attackers could exploit \nthis flaw to cause a denial of service (system crash). (CVE-2014-2706)\n\nA flaw was discovered in the Linux kernel's ping sockets. An unprivileged \nlocal user could exploit this flaw to cause a denial of service (system \ncrash) or possibly gain privileges via a crafted application. \n(CVE-2014-2851)\n\nSasha Levin reported a bug in the Linux kernel's virtual memory management \nsubsystem. An unprivileged local user could exploit this flaw to cause a \ndenial of service (system crash). (CVE-2014-3122)", "edition": 5, "modified": "2014-05-27T00:00:00", "published": "2014-05-27T00:00:00", "id": "USN-2224-1", "href": "https://ubuntu.com/security/notices/USN-2224-1", "title": "Linux kernel (Raring HWE) vulnerabilities", "type": "ubuntu", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-02T11:41:01", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3122", "CVE-2014-2672", "CVE-2014-1737", "CVE-2014-1738", "CVE-2014-2851", "CVE-2014-2309", "CVE-2014-2678", "CVE-2013-4483", "CVE-2014-0055", "CVE-2014-0077", "CVE-2014-2523", "CVE-2014-0101", "CVE-2014-2706"], "description": "Matthew Daley reported an information leak in the floppy disk driver of the \nLinux kernel. An unprivileged local user could exploit this flaw to obtain \npotentially sensitive information from kernel memory. (CVE-2014-1738)\n\nMatthew Daley reported a flaw in the handling of ioctl commands by the \nfloppy disk driver in the Linux kernel. An unprivileged local user could \nexploit this flaw to gain administrative privileges if the floppy disk \nmodule is loaded. (CVE-2014-1737)\n\nA flaw was discovered in the Linux kernel's IPC reference counting. An \nunprivileged local user could exploit this flaw to cause a denial of \nservice (OOM system crash). (CVE-2013-4483)\n\nA flaw was discovered in the vhost-net subsystem of the Linux kernel. Guest \nOS users could exploit this flaw to cause a denial of service (host OS \ncrash). (CVE-2014-0055)\n\nA flaw was discovered in the handling of network packets when mergeable \nbuffers are disabled for virtual machines in the Linux kernel. Guest OS \nusers may exploit this flaw to cause a denial of service (host OS crash) or \npossibly gain privilege on the host OS. (CVE-2014-0077)\n\nA flaw was discovered in the Linux kernel's handling of the SCTP handshake. \nA remote attacker could exploit this flaw to cause a denial of service \n(system crash). (CVE-2014-0101)\n\nA flaw was discovered in the handling of routing information in Linux \nkernel's IPv6 stack. A remote attacker could exploit this flaw to cause a \ndenial of service (memory consumption) via a flood of ICMPv6 router \nadvertisement packets. (CVE-2014-2309)\n\nAn error was discovered in the Linux kernel's DCCP protocol support. A \nremote attacked could exploit this flaw to cause a denial of service \n(system crash) or possibly execute arbitrary code. (CVE-2014-2523)\n\nMax Sydorenko discovered a race condition in the Atheros 9k wireless driver \nin the Linux kernel. This race could be exploited by remote attackers to \ncause a denial of service (system crash). (CVE-2014-2672)\n\nAn error was discovered in the Reliable Datagram Sockets (RDS) protocol \nstack in the Linux kernel. A local user could exploit this flaw to cause a \ndenial of service (system crash) or possibly have unspecified other impact. \n(CVE-2014-2678)\n\nYaara Rozenblum discovered a race condition in the Linux kernel's Generic \nIEEE 802.11 Networking Stack (mac80211). Remote attackers could exploit \nthis flaw to cause a denial of service (system crash). (CVE-2014-2706)\n\nA flaw was discovered in the Linux kernel's ping sockets. An unprivileged \nlocal user could exploit this flaw to cause a denial of service (system \ncrash) or possibly gain privileges via a crafted application. \n(CVE-2014-2851)\n\nSasha Levin reported a bug in the Linux kernel's virtual memory management \nsubsystem. An unprivileged local user could exploit this flaw to cause a \ndenial of service (system crash). (CVE-2014-3122)", "edition": 5, "modified": "2014-05-27T00:00:00", "published": "2014-05-27T00:00:00", "id": "USN-2223-1", "href": "https://ubuntu.com/security/notices/USN-2223-1", "title": "Linux kernel (Quantal HWE) vulnerabilities", "type": "ubuntu", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-08T23:36:03", "bulletinFamily": "unix", "cvelist": ["CVE-2014-2672", "CVE-2014-0100", "CVE-2014-1737", "CVE-2014-1738", "CVE-2014-2851", "CVE-2014-2673", "CVE-2014-2309", "CVE-2014-2678", "CVE-2014-0055", "CVE-2014-0077", "CVE-2014-2523", "CVE-2014-0101", "CVE-2014-2706"], "description": "Matthew Daley reported an information leak in the floppy disk driver of the \nLinux kernel. An unprivileged local user could exploit this flaw to obtain \npotentially sensitive information from kernel memory. (CVE-2014-1738)\n\nMatthew Daley reported a flaw in the handling of ioctl commands by the \nfloppy disk driver in the Linux kernel. An unprivileged local user could \nexploit this flaw to gain administrative privileges if the floppy disk \nmodule is loaded. (CVE-2014-1737)\n\nA flaw was discovered in the vhost-net subsystem of the Linux kernel. Guest \nOS users could exploit this flaw to cause a denial of service (host OS \ncrash). (CVE-2014-0055)\n\nA flaw was discovered in the handling of network packets when mergeable \nbuffers are disabled for virtual machines in the Linux kernel. Guest OS \nusers may exploit this flaw to cause a denial of service (host OS crash) or \npossibly gain privilege on the host OS. (CVE-2014-0077)\n\nNikolay Aleksandrov discovered a race condition in Linux kernel's IPv4 \nfragment handling code. Remote attackers could exploit this flaw to cause a \ndenial of service (system crash) or possibly have other unspecified impact. \n(CVE-2014-0100)\n\nA flaw was discovered in the Linux kernel's handling of the SCTP handshake. \nA remote attacker could exploit this flaw to cause a denial of service \n(system crash). (CVE-2014-0101)\n\nA flaw was discovered in the handling of routing information in Linux \nkernel's IPv6 stack. A remote attacker could exploit this flaw to cause a \ndenial of service (memory consumption) via a flood of ICMPv6 router \nadvertisement packets. (CVE-2014-2309)\n\nAn error was discovered in the Linux kernel's DCCP protocol support. A \nremote attacked could exploit this flaw to cause a denial of service \n(system crash) or possibly execute arbitrary code. (CVE-2014-2523)\n\nMax Sydorenko discovered a race condition in the Atheros 9k wireless driver \nin the Linux kernel. This race could be exploited by remote attackers to \ncause a denial of service (system crash). (CVE-2014-2672)\n\nAdhemerval Zanella Neto discovered a flaw the in the Transactional Memory \n(TM) implementation for powerpc based machine. An unprivileged local user \ncould exploit this flaw to cause a denial of service (system crash). \n(CVE-2014-2673)\n\nAn error was discovered in the Reliable Datagram Sockets (RDS) protocol \nstack in the Linux kernel. A local user could exploit this flaw to cause a \ndenial of service (system crash) or possibly have unspecified other impact. \n(CVE-2014-2678)\n\nYaara Rozenblum discovered a race condition in the Linux kernel's Generic \nIEEE 802.11 Networking Stack (mac80211). Remote attackers could exploit \nthis flaw to cause a denial of service (system crash). (CVE-2014-2706)\n\nA flaw was discovered in the Linux kernel's ping sockets. An unprivileged \nlocal user could exploit this flaw to cause a denial of service (system \ncrash) or possibly gain privileges via a crafted application. \n(CVE-2014-2851)", "edition": 5, "modified": "2014-05-27T00:00:00", "published": "2014-05-27T00:00:00", "id": "USN-2228-1", "href": "https://ubuntu.com/security/notices/USN-2228-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-02T11:43:04", "bulletinFamily": "unix", "cvelist": ["CVE-2014-2672", "CVE-2014-1737", "CVE-2014-1738", "CVE-2014-8709", "CVE-2014-2851", "CVE-2014-2309", "CVE-2014-2678", "CVE-2013-4483", "CVE-2014-0077", "CVE-2014-2523", "CVE-2014-0101", "CVE-2014-0069", "CVE-2014-2706"], "description": "Matthew Daley reported an information leak in the floppy disk driver of the \nLinux kernel. An unprivileged local user could exploit this flaw to obtain \npotentially sensitive information from kernel memory. (CVE-2014-1738)\n\nMatthew Daley reported a flaw in the handling of ioctl commands by the \nfloppy disk driver in the Linux kernel. An unprivileged local user could \nexploit this flaw to gain administrative privileges if the floppy disk \nmodule is loaded. (CVE-2014-1737)\n\nA flaw was discovered in the Linux kernel's IPC reference counting. An \nunprivileged local user could exploit this flaw to cause a denial of \nservice (OOM system crash). (CVE-2013-4483)\n\nAl Viro discovered an error in how CIFS in the Linux kernel handles \nuncached write operations. An unprivileged local user could exploit this \nflaw to cause a denial of service (system crash), obtain sensitive \ninformation from kernel memory, or possibly gain privileges. \n(CVE-2014-0069)\n\nA flaw was discovered in the handling of network packets when mergeable \nbuffers are disabled for virtual machines in the Linux kernel. Guest OS \nusers may exploit this flaw to cause a denial of service (host OS crash) or \npossibly gain privilege on the host OS. (CVE-2014-0077)\n\nA flaw was discovered in the Linux kernel's handling of the SCTP handshake. \nA remote attacker could exploit this flaw to cause a denial of service \n(system crash). (CVE-2014-0101)\n\nA flaw was discovered in the handling of routing information in Linux \nkernel's IPv6 stack. A remote attacker could exploit this flaw to cause a \ndenial of service (memory consumption) via a flood of ICMPv6 router \nadvertisement packets. (CVE-2014-2309)\n\nAn error was discovered in the Linux kernel's DCCP protocol support. A \nremote attacked could exploit this flaw to cause a denial of service \n(system crash) or possibly execute arbitrary code. (CVE-2014-2523)\n\nMax Sydorenko discovered a race condition in the Atheros 9k wireless driver \nin the Linux kernel. This race could be exploited by remote attackers to \ncause a denial of service (system crash). (CVE-2014-2672)\n\nAn error was discovered in the Reliable Datagram Sockets (RDS) protocol \nstack in the Linux kernel. A local user could exploit this flaw to cause a \ndenial of service (system crash) or possibly have unspecified other impact. \n(CVE-2014-2678)\n\nYaara Rozenblum discovered a race condition in the Linux kernel's Generic \nIEEE 802.11 Networking Stack (mac80211). Remote attackers could exploit \nthis flaw to cause a denial of service (system crash). (CVE-2014-2706)\n\nA flaw was discovered in the Linux kernel's ping sockets. An unprivileged \nlocal user could exploit this flaw to cause a denial of service (system \ncrash) or possibly gain privileges via a crafted application. \n(CVE-2014-2851)\n\nJouni Malinen reported a flaw in the handling of fragmentation in the \nmac8Linux subsystem of the kernel. A remote attacker could exploit this \nflaw to obtain potential sensitive cleartext information by reading \npackets. (CVE-2014-8709)", "edition": 5, "modified": "2014-05-26T00:00:00", "published": "2014-05-26T00:00:00", "id": "USN-2221-1", "href": "https://ubuntu.com/security/notices/USN-2221-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-02T11:35:31", "bulletinFamily": "unix", "cvelist": ["CVE-2014-9715", "CVE-2014-2672", "CVE-2014-0100", "CVE-2014-1737", "CVE-2014-1738", "CVE-2014-2851", "CVE-2014-2673", "CVE-2014-2309", "CVE-2014-2678", "CVE-2014-0055", "CVE-2014-0077", "CVE-2014-2523", "CVE-2014-0101", "CVE-2014-2706"], "description": "Matthew Daley reported an information leak in the floppy disk driver of the \nLinux kernel. An unprivileged local user could exploit this flaw to obtain \npotentially sensitive information from kernel memory. (CVE-2014-1738)\n\nMatthew Daley reported a flaw in the handling of ioctl commands by the \nfloppy disk driver in the Linux kernel. An unprivileged local user could \nexploit this flaw to gain administrative privileges if the floppy disk \nmodule is loaded. (CVE-2014-1737)\n\nA flaw was discovered in the vhost-net subsystem of the Linux kernel. Guest \nOS users could exploit this flaw to cause a denial of service (host OS \ncrash). (CVE-2014-0055)\n\nA flaw was discovered in the handling of network packets when mergeable \nbuffers are disabled for virtual machines in the Linux kernel. Guest OS \nusers may exploit this flaw to cause a denial of service (host OS crash) or \npossibly gain privilege on the host OS. (CVE-2014-0077)\n\nNikolay Aleksandrov discovered a race condition in Linux kernel's IPv4 \nfragment handling code. Remote attackers could exploit this flaw to cause a \ndenial of service (system crash) or possibly have other unspecified impact. \n(CVE-2014-0100)\n\nA flaw was discovered in the Linux kernel's handling of the SCTP handshake. \nA remote attacker could exploit this flaw to cause a denial of service \n(system crash). (CVE-2014-0101)\n\nA flaw was discovered in the handling of routing information in Linux \nkernel's IPv6 stack. A remote attacker could exploit this flaw to cause a \ndenial of service (memory consumption) via a flood of ICMPv6 router \nadvertisement packets. (CVE-2014-2309)\n\nAn error was discovered in the Linux kernel's DCCP protocol support. A \nremote attacked could exploit this flaw to cause a denial of service \n(system crash) or possibly execute arbitrary code. (CVE-2014-2523)\n\nMax Sydorenko discovered a race condition in the Atheros 9k wireless driver \nin the Linux kernel. This race could be exploited by remote attackers to \ncause a denial of service (system crash). (CVE-2014-2672)\n\nAdhemerval Zanella Neto discovered a flaw the in the Transactional Memory \n(TM) implementation for powerpc based machine. An unprivileged local user \ncould exploit this flaw to cause a denial of service (system crash). \n(CVE-2014-2673)\n\nAn error was discovered in the Reliable Datagram Sockets (RDS) protocol \nstack in the Linux kernel. A local user could exploit this flaw to cause a \ndenial of service (system crash) or possibly have unspecified other impact. \n(CVE-2014-2678)\n\nYaara Rozenblum discovered a race condition in the Linux kernel's Generic \nIEEE 802.11 Networking Stack (mac80211). Remote attackers could exploit \nthis flaw to cause a denial of service (system crash). (CVE-2014-2706)\n\nA flaw was discovered in the Linux kernel's ping sockets. An unprivileged \nlocal user could exploit this flaw to cause a denial of service (system \ncrash) or possibly gain privileges via a crafted application. \n(CVE-2014-2851)\n\nVincent Tondellier discovered an integer overflow in the Linux kernel's \nnetfilter connection tracking accounting of loaded extensions. An attacker \non the local area network (LAN) could potential exploit this flaw to cause \na denial of service (system crash of targeted system). (CVE-2014-9715)", "edition": 5, "modified": "2014-05-27T00:00:00", "published": "2014-05-27T00:00:00", "id": "USN-2225-1", "href": "https://ubuntu.com/security/notices/USN-2225-1", "title": "Linux kernel (Saucy HWE) vulnerabilities", "type": "ubuntu", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-02T11:37:39", "bulletinFamily": "unix", "cvelist": ["CVE-2014-2672", "CVE-2014-1737", "CVE-2014-1738", "CVE-2014-8709", "CVE-2014-0196", "CVE-2014-2851", "CVE-2014-2309", "CVE-2014-2678", "CVE-2013-4483", "CVE-2014-0077", "CVE-2014-2523", "CVE-2014-0101", "CVE-2014-0069", "CVE-2014-2706"], "description": "A flaw was discovered in the Linux kernel's pseudo tty (pty) device. An \nunprivileged user could exploit this flaw to cause a denial of service \n(system crash) or potentially gain administrator privileges. \n(CVE-2014-0196)\n\nMatthew Daley reported an information leak in the floppy disk driver of the \nLinux kernel. An unprivileged local user could exploit this flaw to obtain \npotentially sensitive information from kernel memory. (CVE-2014-1738)\n\nMatthew Daley reported a flaw in the handling of ioctl commands by the \nfloppy disk driver in the Linux kernel. An unprivileged local user could \nexploit this flaw to gain administrative privileges if the floppy disk \nmodule is loaded. (CVE-2014-1737)\n\nA flaw was discovered in the Linux kernel's IPC reference counting. An \nunprivileged local user could exploit this flaw to cause a denial of \nservice (OOM system crash). (CVE-2013-4483)\n\nAl Viro discovered an error in how CIFS in the Linux kernel handles \nuncached write operations. An unprivileged local user could exploit this \nflaw to cause a denial of service (system crash), obtain sensitive \ninformation from kernel memory, or possibly gain privileges. \n(CVE-2014-0069)\n\nA flaw was discovered in the handling of network packets when mergeable \nbuffers are disabled for virtual machines in the Linux kernel. Guest OS \nusers may exploit this flaw to cause a denial of service (host OS crash) or \npossibly gain privilege on the host OS. (CVE-2014-0077)\n\nA flaw was discovered in the Linux kernel's handling of the SCTP handshake. \nA remote attacker could exploit this flaw to cause a denial of service \n(system crash). (CVE-2014-0101)\n\nA flaw was discovered in the handling of routing information in Linux \nkernel's IPv6 stack. A remote attacker could exploit this flaw to cause a \ndenial of service (memory consumption) via a flood of ICMPv6 router \nadvertisement packets. (CVE-2014-2309)\n\nAn error was discovered in the Linux kernel's DCCP protocol support. A \nremote attacked could exploit this flaw to cause a denial of service \n(system crash) or possibly execute arbitrary code. (CVE-2014-2523)\n\nMax Sydorenko discovered a race condition in the Atheros 9k wireless driver \nin the Linux kernel. This race could be exploited by remote attackers to \ncause a denial of service (system crash). (CVE-2014-2672)\n\nAn error was discovered in the Reliable Datagram Sockets (RDS) protocol \nstack in the Linux kernel. A local user could exploit this flaw to cause a \ndenial of service (system crash) or possibly have unspecified other impact. \n(CVE-2014-2678)\n\nYaara Rozenblum discovered a race condition in the Linux kernel's Generic \nIEEE 802.11 Networking Stack (mac80211). Remote attackers could exploit \nthis flaw to cause a denial of service (system crash). (CVE-2014-2706)\n\nA flaw was discovered in the Linux kernel's ping sockets. An unprivileged \nlocal user could exploit this flaw to cause a denial of service (system \ncrash) or possibly gain privileges via a crafted application. \n(CVE-2014-2851)\n\nJouni Malinen reported a flaw in the handling of fragmentation in the \nmac8Linux subsystem of the kernel. A remote attacker could exploit this \nflaw to obtain potential sensitive cleartext information by reading \npackets. (CVE-2014-8709)", "edition": 5, "modified": "2014-05-27T00:00:00", "published": "2014-05-27T00:00:00", "id": "USN-2227-1", "href": "https://ubuntu.com/security/notices/USN-2227-1", "title": "Linux kernel (OMAP4) vulnerabilities", "type": "ubuntu", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "suse": [{"lastseen": "2016-09-04T11:26:04", "bulletinFamily": "unix", "cvelist": ["CVE-2014-5077", "CVE-2014-1739", "CVE-2014-4508", "CVE-2014-4943", "CVE-2014-4171", "CVE-2014-5472", "CVE-2014-4027", "CVE-2013-1979", "CVE-2014-3153", "CVE-2014-6410", "CVE-2014-5471", "CVE-2014-4667", "CVE-2014-2706"], "edition": 1, "description": "The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix\n various bugs and security issues.\n\n The following security bugs have been fixed:\n\n *\n\n CVE-2014-1739: The media_device_enum_entities function in\n drivers/media/media-device.c in the Linux kernel before 3.14.6 does not\n initialize a certain data structure, which allows local users to\n obtain sensitive information from kernel memory by leveraging\n /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call\n (bnc#882804).\n\n *\n\n CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does\n not properly implement the interaction between range notification and hole\n punching, which allows local users to cause a denial of service (i_mutex\n hold) by using the mmap system call to access a hole, as demonstrated by\n interfering with intended shmem activity by blocking completion of (1) an\n MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call\n (bnc#883518).\n\n *\n\n CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel\n through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled\n and the sep CPU feature flag is set, allows local users to cause a denial\n of service (OOPS and system crash) via an invalid syscall number, as\n demonstrated by number 1000 (bnc#883724).\n\n *\n\n CVE-2014-4667: The sctp_association_free function in\n net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly\n manage a certain backlog value, which allows remote attackers to cause a\n denial of service (socket outage) via a crafted SCTP packet (bnc#885422).\n\n *\n\n CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the\n Linux kernel through 3.15.6 allows local users to gain privileges by\n leveraging data-structure differences between an l2tp socket and an inet\n socket (bnc#887082).\n\n *\n\n CVE-2014-5077: The sctp_assoc_update function in\n net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP\n authentication is enabled, allows remote attackers to cause a denial of\n service (NULL pointer dereference and OOPS) by starting to establish an\n association between two endpoints immediately after an exchange of INIT\n and INIT ACK chunks to establish an earlier association between these\n endpoints in the opposite direction (bnc#889173).\n\n *\n\n CVE-2014-5471: Stack consumption vulnerability in the\n parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux\n kernel through 3.16.1 allows local users to cause a denial of service\n (uncontrolled recursion, and system crash or reboot) via a crafted iso9660\n image with a CL entry referring to a directory entry that has a CL entry.\n (bnc#892490)\n\n *\n\n CVE-2014-5472: The parse_rock_ridge_inode_internal function in\n fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to\n cause a denial of service (unkillable mount process) via a crafted iso9660\n image with a self-referential CL entry. (bnc#892490)\n\n *\n\n CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux\n kernel before 3.13.7 allows remote attackers to cause a denial of service\n (system crash) via network traffic that improperly interacts with the\n WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and\n tx.c. (bnc#871797)\n\n *\n\n CVE-2014-4027: The rd_build_device_space function in\n drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not\n properly initialize a certain data structure, which allows local users to\n obtain sensitive information from ramdisk_mcp memory by leveraging access\n to a SCSI initiator. (bnc#882639)\n\n *\n\n CVE-2014-3153 The futex_requeue function in kernel/futex.c in the\n Linux kernel through 3.14.5 does not ensure that calls have two different\n futex addresses, which allows local users to gain privileges via a crafted\n FUTEX_REQUEUE command that facilitates unsafe waiter modification.\n (bnc#880892)\n\n *\n\n CVE-2014-6410: Avoid infinite loop when processing indirect ICBs\n (bnc#896689)\n\n The following non-security bugs have been fixed:\n\n * ACPI / PAD: call schedule() when need_resched() is true (bnc#866911).\n * ACPI: Fix bug when ACPI reset register is implemented in system\n memory (bnc#882900).\n * ACPI: Limit access to custom_method (bnc#884333).\n * ALSA: hda - Enabling Realtek ALC 671 codec (bnc#891746).\n * Add option to automatically enforce module signatures when in Secure\n Boot mode (bnc#884333).\n * Add secure_modules() call (bnc#884333).\n * Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344).\n * Backported new patches of Lock down functions for UEFI secure boot\n Also updated series.conf and removed old patches.\n * Btrfs: Return EXDEV for cross file system snapshot.\n * Btrfs: abort the transaction when we does not find our extent ref.\n * Btrfs: avoid warning bomb of btrfs_invalidate_inodes.\n * Btrfs: cancel scrub on transaction abortion.\n * Btrfs: correctly set profile flags on seqlock retry.\n * Btrfs: does not check nodes for extent items.\n * Btrfs: fix a possible deadlock between scrub and transaction\n committing.\n * Btrfs: fix corruption after write/fsync failure + fsync + log\n recovery (bnc#894200).\n * Btrfs: fix csum tree corruption, duplicate and outdated checksums\n (bnc#891619).\n * Btrfs: fix double free in find_lock_delalloc_range.\n * Btrfs: fix possible memory leak in btrfs_create_tree().\n * Btrfs: fix use of uninit "ret" in end_extent_writepage().\n * Btrfs: free delayed node outside of root->inode_lock (bnc#866864).\n * Btrfs: make DEV_INFO ioctl available to anyone.\n * Btrfs: make FS_INFO ioctl available to anyone.\n * Btrfs: make device scan less noisy.\n * Btrfs: make sure there are not any read requests before stopping\n workers.\n * Btrfs: more efficient io tree navigation on wait_extent_bit.\n * Btrfs: output warning instead of error when loading free space cache\n failed.\n * Btrfs: retrieve more info from FS_INFO ioctl.\n * Btrfs: return EPERM when deleting a default subvolume (bnc#869934).\n * Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol\n (bnc#866615).\n * Btrfs: use right type to get real comparison.\n * Btrfs: wake up @scrub_pause_wait as much as we can.\n * Btrfs: wake up transaction thread upon remount.\n * CacheFiles: Add missing retrieval completions (bnc#880344).\n * CacheFiles: Does not try to dump the index key if the cookie has\n been cleared (bnc#880344).\n * CacheFiles: Downgrade the requirements passed to the allocator\n (bnc#880344).\n * CacheFiles: Fix the marking of cached pages (bnc#880344).\n * CacheFiles: Implement invalidation (bnc#880344).\n * CacheFiles: Make some debugging statements conditional (bnc#880344).\n * Drivers: hv: util: Fix a bug in the KVP code (bnc#886840).\n * Drivers: hv: vmbus: Fix a bug in the channel callback dispatch code\n (bnc#886840).\n * FS-Cache: Add transition to handle invalidate immediately after\n lookup (bnc#880344).\n * FS-Cache: Check that there are no read ops when cookie relinquished\n (bnc#880344).\n * FS-Cache: Clear remaining page count on retrieval cancellation\n (bnc#880344).\n * FS-Cache: Convert the object event ID #defines into an enum\n (bnc#880344).\n * FS-Cache: Does not sleep in page release if __GFP_FS is not set\n (bnc#880344).\n * FS-Cache: Does not use spin_is_locked() in assertions (bnc#880344).\n * FS-Cache: Exclusive op submission can BUG if there is been an I/O\n error (bnc#880344).\n * FS-Cache: Fix __wait_on_atomic_t() to call the action func if the\n counter != 0 (bnc#880344).\n * FS-Cache: Fix object state machine to have separate work and wait\n states (bnc#880344).\n * FS-Cache: Fix operation state management and accounting (bnc#880344).\n * FS-Cache: Fix signal handling during waits (bnc#880344).\n * FS-Cache: Initialise the object event mask with the calculated mask\n (bnc#880344).\n * FS-Cache: Limit the number of I/O error reports for a cache\n (bnc#880344).\n * FS-Cache: Make cookie relinquishment wait for outstanding reads\n (bnc#880344).\n * FS-Cache: Mark cancellation of in-progress operation (bnc#880344).\n * FS-Cache: One of the write operation paths doeses not set the object\n state (bnc#880344).\n * FS-Cache: Provide proper invalidation (bnc#880344).\n * FS-Cache: Simplify cookie retention for fscache_objects, fixing oops\n (bnc#880344).\n * FS-Cache: The retrieval remaining-pages counter needs to be atomic_t\n (bnc#880344).\n * FS-Cache: Uninline fscache_object_init() (bnc#880344).\n * FS-Cache: Wrap checks on object state (bnc#880344).\n * HID: usbhid: add always-poll quirk (bnc#888607).\n * HID: usbhid: enable always-poll quirk for Elan Touchscreen\n (bnc#888607).\n * IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297).\n * Ignore "flags" change to event_constraint (bnc#876114).\n * Ignore data_src/weight changes to perf_sample_data (bnc#876114).\n * NFS: Allow more operations in an NFSv4.1 request (bnc#890513).\n * NFS: Clean up helper function nfs4_select_rw_stateid() (bnc#888968).\n * NFS: Does not copy read delegation stateids in setattr (bnc#888968).\n * NFS: Does not use a delegation to open a file when returning that\n delegation (bnc#888968, bnc#892200, bnc#893596, bnc#893496)\n * NFS: Fixes for NFS RCU-walk support in line with code going upstream\n * NFS: Use FS-Cache invalidation (bnc#880344).\n * NFS: allow lockless access to access_cache (bnc#866130).\n * NFS: avoid mountpoint being displayed as " (deleted)" in\n /proc/mounts (bnc#888591).\n * NFS: nfs4_do_open should add negative results to the dcache\n (bnc#866130).\n * NFS: nfs_migrate_page() does not wait for FS-Cache to finish with a\n page (bnc#880344).\n * NFS: nfs_open_revalidate: only evaluate parent if it will be used\n (bnc#866130).\n * NFS: prepare for RCU-walk support but pushing tests later in code\n (bnc#866130).\n * NFS: support RCU_WALK in nfs_permission() (bnc#866130).\n * NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130).\n * NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130).\n * NFSD: Does not hand out delegations for 30 seconds after recalling\n them (bnc#880370).\n * NFSv4 set open access operation call flag in nfs4_init_opendata_res\n (bnc#888968, bnc#892200, bnc#893596, bnc#893496).\n * NFSv4: Add a helper for encoding opaque data (bnc#888968).\n * NFSv4: Add a helper for encoding stateids (bnc#888968).\n * NFSv4: Add helpers for basic copying of stateids (bnc#888968).\n * NFSv4: Clean up nfs4_select_rw_stateid() (bnc#888968).\n * NFSv4: Fix the return value of nfs4_select_rw_stateid (bnc#888968).\n * NFSv4: Rename nfs4_copy_stateid() (bnc#888968).\n * NFSv4: Resend the READ/WRITE RPC call if a stateid change causes an\n error (bnc#888968).\n * NFSv4: Simplify the struct nfs4_stateid (bnc#888968).\n * NFSv4: The stateid must remain the same for replayed RPC calls\n (bnc#888968).\n * NFSv4: nfs4_stateid_is_current should return "true" for an invalid\n stateid (bnc#888968).\n * One more fix for kABI breakage.\n * PCI: Lock down BAR access when module security is enabled\n (bnc#884333).\n * PCI: enable MPS "performance" setting to properly handle bridge MPS\n (bnc#883376).\n * PM / Hibernate: Add memory_rtree_find_bit function (bnc#860441).\n * PM / Hibernate: Create a Radix-Tree to store memory bitmap\n (bnc#860441).\n * PM / Hibernate: Implement position keeping in radix tree\n (bnc#860441).\n * PM / Hibernate: Iterate over set bits instead of PFNs in\n swsusp_free() (bnc#860441).\n * PM / Hibernate: Remove the old memory-bitmap implementation\n (bnc#860441).\n * PM / Hibernate: Touch Soft Lockup Watchdog in rtree_next_node\n (bnc#860441).\n * Restrict /dev/mem and /dev/kmem when module loading is restricted\n (bnc#884333).\n * Reuse existing "state" field to indicate PERF_X86_EVENT_PEBS_LDLAT\n (bnc#876114).\n * USB: handle LPM errors during device suspend correctly (bnc#849123).\n * Update kabi files to reflect fscache change (bnc#880344)\n * Update x86_64 config files: re-enable SENSORS_W83627EHF (bnc#891281)\n * VFS: Make more complete truncate operation available to CacheFiles\n (bnc#880344).\n * [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger (FATE#83366,\n ltc#83367).\n * acpi: Ignore acpi_rsdp kernel parameter when module loading is\n restricted (bnc#884333).\n * af_iucv: correct cleanup if listen backlog is full (bnc#885262,\n LTC#111728).\n * asus-wmi: Restrict debugfs interface when module loading is\n restricted (bnc#884333).\n * autofs4: allow RCU-walk to walk through autofs4 (bnc#866130).\n * autofs4: avoid taking fs_lock during rcu-walk (bnc#866130).\n * autofs4: does not take spinlock when not needed in\n autofs4_lookup_expiring (bnc#866130).\n * autofs4: factor should_expire() out of autofs4_expire_indirect\n (bnc#866130).\n * autofs4: make "autofs4_can_expire" idempotent (bnc#866130).\n * autofs4: remove a redundant assignment (bnc#866130).\n * autofs: fix lockref lookup (bnc#888591).\n * be2net: add dma_mapping_error() check for dma_map_page()\n (bnc#881759).\n * block: add cond_resched() to potentially long running ioctl discard\n loop (bnc#884725).\n * block: fix race between request completion and timeout handling\n (bnc#881051).\n * cdc-ether: clean packet filter upon probe (bnc#876017).\n * cpuset: Fix memory allocator deadlock (bnc#876590).\n * crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs\n have them, but some are FIPS certified, with some kernel support.\n * crypto: fips - only panic on bad/missing crypto mod signatures\n (bnc#887503).\n * crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips\n mode (bnc#889451).\n * dasd: validate request size before building CCW/TCW (bnc#891087,\n LTC#114068).\n * dm mpath: fix race condition between multipath_dtr and pg_init_done\n (bnc#826486).\n * dm-mpath: fix panic on deleting sg device (bnc#870161).\n * drm/ast: AST2000 cannot be detected correctly (bnc#895983).\n * drm/ast: Actually load DP501 firmware when required (bnc#895608\n bnc#871134).\n * drm/ast: Add missing entry to dclk_table[].\n * drm/ast: Add reduced non reduced mode parsing for wide screen mode\n (bnc#892723).\n * drm/ast: initial DP501 support (v0.2) (bnc#871134).\n * drm/ast: open key before detect chips (bnc#895983).\n * drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304).\n * drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064).\n * drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init\n (bnc#869055).\n * drm/i915: create functions for the "unclaimed register" checks\n (bnc#869055).\n * drm/i915: use FPGA_DBG for the "unclaimed register" checks\n (bnc#869055).\n * drm/mgag200: Initialize data needed to map fbdev memory (bnc\n #806990).\n * e1000e: enable support for new device IDs (bnc#885509).\n * fs/fscache: remove spin_lock() from the condition in while()\n (bnc#880344).\n * hibernate: Disable in a signed modules environment (bnc#884333).\n * hugetlb: does not use ERR_PTR with VM_FAULT* values\n * ibmvscsi: Abort init sequence during error recovery (bnc#885382).\n * ibmvscsi: Add memory barriers for send / receive (bnc#885382).\n * inet: add a redirect generation id in inetpeer (bnc#860593).\n * inetpeer: initialize ->redirect_genid in inet_getpeer() (bnc#860593).\n * ipv6: tcp: fix tcp_v6_conn_request() (bnc#887645).\n * kabi: hide bnc#860593 changes of struct inetpeer_addr_base\n (bnc#860593).\n * kernel: 3215 tty hang (bnc#891087, LTC#114562).\n * kernel: fix data corruption when reading /proc/sysinfo (bnc#891087,\n LTC#114480).\n * kernel: fix kernel oops with load of fpc register (bnc#889061,\n LTC#113596).\n * kernel: sclp console tty reference counting (bnc#891087, LTC#115466).\n * kexec: Disable at runtime if the kernel enforces module loading\n restrictions (bnc#884333).\n * md/raid6: avoid data corruption during recovery of double-degraded\n RAID6.\n * memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim\n fix).\n * memcg: do not expose uninitialized mem_cgroup_per_node to world\n (bnc#883096).\n * mm, hugetlb: add VM_NORESERVE check in vma_has_reserves()\n * mm, hugetlb: change variable name reservations to resv\n * mm, hugetlb: decrement reserve count if VM_NORESERVE alloc page cache\n * mm, hugetlb: defer freeing pages when gathering surplus pages\n * mm, hugetlb: do not use a page in page cache for cow optimization\n * mm, hugetlb: fix and clean-up node iteration code to alloc or free\n * mm, hugetlb: fix race in region tracking\n * mm, hugetlb: fix subpool accounting handling\n * mm, hugetlb: improve page-fault scalability\n * mm, hugetlb: improve, cleanup resv_map parameters\n * mm, hugetlb: move up the code which check availability of free huge\n page\n * mm, hugetlb: protect reserved pages when soft offlining a hugepage\n * mm, hugetlb: remove decrement_hugepage_resv_vma()\n * mm, hugetlb: remove redundant list_empty check in\n gather_surplus_pages()\n * mm, hugetlb: remove resv_map_put\n * mm, hugetlb: remove useless check about mapping type\n * mm, hugetlb: return a reserved page to a reserved pool if failed\n * mm, hugetlb: trivial commenting fix\n * mm, hugetlb: unify region structure handling\n * mm, hugetlb: unify region structure handling kabi\n * mm, hugetlb: use long vars instead of int in region_count() (Hugetlb\n Fault Scalability).\n * mm, hugetlb: use vma_resv_map() map types\n * mm, oom: fix badness score underflow (bnc#884582, bnc#884767).\n * mm, oom: normalize oom scores to oom_score_adj scale only for\n userspace (bnc#884582, bnc#884767).\n * mm, thp: do not allow thp faults to avoid cpuset restrictions\n (bnc#888849).\n * net/mlx4_core: Load higher level modules according to ports type\n (bnc#887680).\n * net/mlx4_core: Load the IB driver when the device supports IBoE\n (bnc#887680).\n * net/mlx4_en: Fix a race between napi poll function and RX ring\n cleanup (bnc#863586).\n * net/mlx4_en: Fix selftest failing on non 10G link speed (bnc#888058).\n * net: fix checksumming features handling in output path (bnc#891259).\n * pagecache_limit: batch large nr_to_scan targets (bnc#895221).\n * pagecachelimit: reduce lru_lock congestion for heavy parallel\n reclaim fix (bnc#895680).\n * perf/core: Add weighted samples (bnc#876114).\n * perf/x86: Add flags to event constraints (bnc#876114).\n * perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114).\n * perf: Add generic memory sampling interface (bnc#876114).\n * qla2xxx: Avoid escalating the SCSI error handler if the command is\n not found in firmware (bnc#859840).\n * qla2xxx: Clear loop_id for ports that are marked lost during fabric\n scanning (bnc#859840).\n * qla2xxx: Does not check for firmware hung during the reset context\n for ISP82XX (bnc#859840).\n * qla2xxx: Issue abort command for outstanding commands during cleanup\n when only firmware is alive (bnc#859840).\n * qla2xxx: Reduce the time we wait for a command to complete during\n SCSI error handling (bnc#859840).\n * qla2xxx: Set host can_queue value based on available resources\n (bnc#859840).\n * restore smp_mb() in unlock_new_inode() (bnc#890526).\n * s390/pci: introduce lazy IOTLB flushing for DMA unmap (bnc#889061,\n LTC#113725).\n * sched: fix the theoretical signal_wake_up() vs schedule() race\n (bnc#876055).\n * sclp_vt220: Enable integrated ASCII console per default (bnc#885262,\n LTC#112035).\n * scsi_dh: use missing accessor "scsi_device_from_queue" (bnc#889614).\n * scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608).\n * scsiback: correct grant page unmapping.\n * scsiback: fix retry handling in __report_luns().\n * scsiback: free resources after error.\n * sunrpc/auth: allow lockless (rcu) lookup of credential cache\n (bnc#866130).\n * supported.conf: remove external from drivers/net/veth (bnc#889727)\n * supported.conf: support net/sched/act_police.ko (bnc#890426)\n * tcp: adapt selected parts of RFC 5682 and PRR logic (bnc#879921).\n * tg3: Change nvram command timeout value to 50ms (bnc#855657).\n * tg3: Override clock, link aware and link idle mode during NVRAM dump\n (bnc#855657).\n * tg3: Set the MAC clock to the fastest speed during boot code load\n (bnc#855657).\n * usb: Does not enable LPM if the exit latency is zero (bnc#832309).\n * usbcore: Does not log on consecutive debounce failures of the same\n port (bnc#888105).\n * usbhid: fix PIXART optical mouse (bnc#888607).\n * uswsusp: Disable when module loading is restricted (bnc#884333).\n * vscsi: support larger transfer sizes (bnc#774818).\n * writeback: Do not sync data dirtied after sync start (bnc#833820).\n * x86 thermal: Delete power-limit-notification console messages\n (bnc#882317).\n * x86 thermal: Disable power limit notification interrupt by default\n (bnc#882317).\n * x86 thermal: Re-enable power limit notification interrupt by default\n (bnc#882317).\n * x86, cpu hotplug: Fix stack frame warning in\n check_irq_vectors_for_cpu_disable() (bnc#887418).\n * x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847).\n * x86/UV: Add kdump to UV NMI handler (bnc#888847).\n * x86/UV: Add summary of cpu activity to UV NMI handler (bnc#888847).\n * x86/UV: Move NMI support (bnc#888847).\n * x86/UV: Update UV support for external NMI signals (bnc#888847).\n * x86/uv/nmi: Fix Sparse warnings (bnc#888847).\n * x86: Add check for number of available vectors before CPU down\n (bnc#887418).\n * x86: Lock down IO port access when module security is enabled\n (bnc#884333).\n * x86: Restrict MSR access when module loading is restricted\n (bnc#884333).\n\n Security Issues:\n\n * CVE-2013-1979\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979</a>>\n * CVE-2014-1739\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739</a>>\n * CVE-2014-2706\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706</a>>\n * CVE-2014-4027\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027</a>>\n * CVE-2014-4171\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171</a>>\n * CVE-2014-4508\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508</a>>\n * CVE-2014-4667\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667</a>>\n * CVE-2014-4943\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943</a>>\n * CVE-2014-5077\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077</a>>\n * CVE-2014-5471\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471</a>>\n * CVE-2014-5472\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472</a>>\n * CVE-2014-3153\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153</a>>\n * CVE-2014-6410\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410</a>>\n\n The SUSE Linux Enterprise 11 Service Pack 3 kernel was updated to fix\n various bugs and security issues.\n\n Following security bugs were fixed: CVE-2013-1979: The scm_set_cred\n function in include/net/scm.h in the Linux kernel before 3.8.11 uses\n incorrect uid and gid values during credentials passing, which allows\n local users to gain privileges via a crafted application (bnc#816708).\n\n CVE-2014-1739: The media_device_enum_entities function in\n drivers/media/media-device.c in the Linux kernel before 3.14.6 does not\n initialize a certain data structure, which allows local users to obtain\n sensitive information from kernel memory by leveraging /dev/media0 read\n access for a MEDIA_IOC_ENUM_ENTITIES ioctl call (bnc#882804).\n\n CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not\n properly implement the interaction between range notification and hole\n punching, which allows local users to cause a denial of service (i_mutex\n hold) by using the mmap system call to access a hole, as demonstrated by\n interfering with intended shmem activity by blocking completion of (1) an\n MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call\n (bnc#883518).\n\n CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through\n 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the\n sep CPU feature flag is set, allows local users to cause a denial of\n service (OOPS and system crash) via an invalid syscall number, as\n demonstrated by number 1000 (bnc#883724).\n\n CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c\n in the Linux kernel before 3.15.2 does not properly manage a certain\n backlog value, which allows remote attackers to cause a denial of service\n (socket outage) via a crafted SCTP packet (bnc#885422).\n\n CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux\n kernel through 3.15.6 allows local users to gain privileges by leveraging\n data-structure differences between an l2tp socket and an inet socket\n (bnc#887082).\n\n CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in\n the Linux kernel through 3.15.8, when SCTP authentication is enabled,\n allows remote attackers to cause a denial of service (NULL pointer\n dereference and OOPS) by starting to establish an association between two\n endpoints immediately after an exchange of INIT and INIT ACK chunks to\n establish an earlier association between these endpoints in the opposite\n direction (bnc#889173).\n\n CVE-2014-5471: Stack consumption vulnerability in the\n parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux\n kernel through 3.16.1 allows local users to cause a denial of service\n (uncontrolled recursion, and system crash or reboot) via a crafted iso9660\n image with a CL entry referring to a directory entry that has a CL entry.\n (bnc#892490)\n\n CVE-2014-5472: The parse_rock_ridge_inode_internal function in\n fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to\n cause a denial of service (unkillable mount process) via a crafted iso9660\n image with a self-referential CL entry. (bnc#892490)\n\n CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux\n kernel before 3.13.7 allows remote attackers to cause a denial of service\n (system crash) via network traffic that improperly interacts with the\n WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and\n tx.c. (bnc#871797)\n\n CVE-2014-4027: The rd_build_device_space function in\n drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not\n properly initialize a certain data structure, which allows local users to\n obtain sensitive information from ramdisk_mcp memory by leveraging access\n to a SCSI initiator. (bnc#882639)\n\n The following non-security bugs were fixed: - ACPI / PAD: call schedule()\n when need_resched() is true (bnc#866911). - ACPI: Fix bug when ACPI reset\n register is implemented in system memory (bnc#882900). - ACPI: Limit\n access to custom_method (bnc#884333). - Add option to automatically\n enforce module signatures when in Secure Boot mode (bnc#884333). - Add\n secure_modules() call (bnc#884333). - Add wait_on_atomic_t() and\n wake_up_atomic_t() (bnc#880344). - Backported new patches of Lock down\n functions for UEFI secure boot Also updated series.conf and removed old\n patches. - Btrfs: Return EXDEV for cross file system snapshot. - Btrfs:\n abort the transaction when we does not find our extent ref. - Btrfs: avoid\n warning bomb of btrfs_invalidate_inodes. - Btrfs: cancel scrub on\n transaction abortion. - Btrfs: correctly set profile flags on seqlock\n retry. - Btrfs: does not check nodes for extent items. - Btrfs: fix a\n possible deadlock between scrub and transaction committing. - Btrfs: fix\n corruption after write/fsync failure + fsync + log recovery (bnc#894200).\n - Btrfs: fix csum tree corruption, duplicate and outdated checksums\n (bnc#891619). - Btrfs: fix double free in find_lock_delalloc_range. -\n Btrfs: fix possible memory leak in btrfs_create_tree(). - Btrfs: fix use\n of uninit "ret" in end_extent_writepage(). - Btrfs: free delayed node\n outside of root->inode_lock (bnc#866864). - Btrfs: make DEV_INFO ioctl\n available to anyone. - Btrfs: make FS_INFO ioctl available to anyone. -\n Btrfs: make device scan less noisy. - Btrfs: make sure there are not any\n read requests before stopping workers. - Btrfs: more efficient io tree\n navigation on wait_extent_bit. - Btrfs: output warning instead of error\n when loading free space cache failed. - Btrfs: retrieve more info from\n FS_INFO ioctl. - Btrfs: return EPERM when deleting a default subvolume\n (bnc#869934). - Btrfs: unset DCACHE_DISCONNECTED when mounting default\n subvol (bnc#866615).\n - Btrfs: use right type to get real comparison. - Btrfs: wake up\n @scrub_pause_wait as much as we can. - Btrfs: wake up transaction thread\n upon remount. - CacheFiles: Add missing retrieval completions\n (bnc#880344).\n - CacheFiles: Does not try to dump the index key if the cookie has been\n cleared (bnc#880344). - CacheFiles: Downgrade the requirements passed to\n the allocator (bnc#880344). - CacheFiles: Fix the marking of cached\n pages (bnc#880344). - CacheFiles: Implement invalidation (bnc#880344). -\n CacheFiles: Make some debugging statements conditional (bnc#880344). -\n Drivers: hv: util: Fix a bug in the KVP code (bnc#886840). - Drivers:\n hv: vmbus: Fix a bug in the channel callback dispatch code (bnc#886840).\n - FS-Cache: Add transition to handle invalidate immediately after lookup\n (bnc#880344). - FS-Cache: Check that there are no read ops when cookie\n relinquished (bnc#880344). - FS-Cache: Clear remaining page count on\n retrieval cancellation (bnc#880344). - FS-Cache: Convert the object\n event ID #defines into an enum (bnc#880344). - FS-Cache: Does not sleep\n in page release if __GFP_FS is not set (bnc#880344). - FS-Cache: Does\n not use spin_is_locked() in assertions (bnc#880344). - FS-Cache:\n Exclusive op submission can BUG if there is been an I/O error\n (bnc#880344). - FS-Cache: Fix __wait_on_atomic_t() to call the action\n func if the counter != 0 (bnc#880344). - FS-Cache: Fix object state\n machine to have separate work and wait states (bnc#880344). - FS-Cache:\n Fix operation state management and accounting (bnc#880344). - FS-Cache:\n Fix signal handling during waits (bnc#880344). - FS-Cache: Initialise\n the object event mask with the calculated mask (bnc#880344). - FS-Cache:\n Limit the number of I/O error reports for a cache (bnc#880344). -\n FS-Cache: Make cookie relinquishment wait for outstanding reads\n (bnc#880344). - FS-Cache: Mark cancellation of in-progress operation\n (bnc#880344). - FS-Cache: One of the write operation paths doeses not\n set the object state (bnc#880344). - FS-Cache: Provide proper\n invalidation (bnc#880344). - FS-Cache: Simplify cookie retention for\n fscache_objects, fixing oops (bnc#880344). - FS-Cache: The retrieval\n remaining-pages counter needs to be atomic_t (bnc#880344). - FS-Cache:\n Uninline fscache_object_init() (bnc#880344). - FS-Cache: Wrap checks on\n object state (bnc#880344). - HID: usbhid: add always-poll quirk\n (bnc#888607). - HID: usbhid: enable always-poll quirk for Elan\n Touchscreen (bnc#888607). - IB/iser: Add TIMEWAIT_EXIT event handling\n (bnc#890297). - Ignore "flags" change to event_constraint (bnc#876114). -\n Ignore data_src/weight changes to perf_sample_data (bnc#876114). - NFS:\n Allow more\n operations in an NFSv4.1 request (bnc#890513). - NFS: Clean up helper\n function nfs4_select_rw_stateid() (bnc#888968). - NFS: Does not copy read\n delegation stateids in setattr (bnc#888968). - NFS: Does not use a\n delegation to open a file when returning that delegation (bnc#888968,\n bnc#892200, bnc#893596, bnc#893496) - NFS: Fixes for NFS RCU-walk support\n in line with code going upstream - NFS: Use FS-Cache invalidation\n (bnc#880344). - NFS: allow lockless access to access_cache (bnc#866130).\n - NFS: avoid mountpoint being displayed as " (deleted)" in /proc/mounts\n (bnc#888591). - NFS: nfs4_do_open should add negative results to the\n dcache (bnc#866130). - NFS: nfs_migrate_page() does not wait for FS-Cache\n to finish with a page (bnc#880344). - NFS: nfs_open_revalidate: only\n evaluate parent if it will be used (bnc#866130). - NFS: prepare for\n RCU-walk support but pushing tests later in code (bnc#866130). - NFS:\n support RCU_WALK in nfs_permission() (bnc#866130). - NFS: teach\n nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130). - NFS: teach\n nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130). - NFSD: Does\n not hand out delegations for 30 seconds after recalling them\n (bnc#880370). - NFSv4 set open access\n operation call flag in nfs4_init_opendata_res (bnc#888968, bnc#892200,\n bnc#893596, bnc#893496). - NFSv4: Add a helper for encoding opaque data\n (bnc#888968). - NFSv4: Add a helper for encoding stateids (bnc#888968). -\n NFSv4: Add helpers for basic copying of stateids (bnc#888968). - NFSv4:\n Clean up nfs4_select_rw_stateid() (bnc#888968). - NFSv4: Fix the return\n value of nfs4_select_rw_stateid (bnc#888968). - NFSv4: Rename\n nfs4_copy_stateid() (bnc#888968). - NFSv4: Resend the READ/WRITE RPC call\n if a stateid change causes an error (bnc#888968). - NFSv4: Simplify the\n struct nfs4_stateid (bnc#888968). - NFSv4: The stateid must remain the\n same for replayed RPC calls (bnc#888968). - NFSv4:\n nfs4_stateid_is_current should return "true" for an invalid stateid\n (bnc#888968). - One more fix for kABI breakage. - PCI: Lock down BAR\n access when module security is enabled (bnc#884333). - PCI: enable MPS\n "performance" setting to properly handle bridge MPS (bnc#883376). - PM /\n Hibernate: Add memory_rtree_find_bit function (bnc#860441). - PM /\n Hibernate: Create a Radix-Tree to store memory bitmap (bnc#860441). - PM\n / Hibernate: Implement position keeping in radix tree (bnc#860441). - PM\n / Hibernate: Iterate over set bits instead of PFNs in swsusp_free()\n (bnc#860441). - PM / Hibernate: Remove the old memory-bitmap\n implementation (bnc#860441). - PM / Hibernate: Touch Soft Lockup Watchdog\n in rtree_next_node (bnc#860441). - Restrict /dev/mem and /dev/kmem when\n module loading is restricted (bnc#884333). - Reuse existing "state" field\n to indicate PERF_X86_EVENT_PEBS_LDLAT (bnc#876114). - USB: handle LPM\n errors during device suspend correctly (bnc#849123). - Update kabi files\n to reflect fscache change (bnc#880344) - VFS: Make more complete truncate\n operation available to CacheFiles (bnc#880344). - [FEAT NET1222]\n ib_uverbs: Allow explicit mmio trigger (FATE#83366, ltc#83367). - acpi:\n Ignore acpi_rsdp kernel parameter when module loading is restricted\n (bnc#884333). - af_iucv: correct cleanup if listen backlog is full\n (bnc#885262, LTC#111728). - asus-wmi: Restrict debugfs interface when\n module loading is restricted (bnc#884333). - autofs4: allow RCU-walk to\n walk through autofs4 (bnc#866130). - autofs4: avoid taking fs_lock during\n rcu-walk (bnc#866130). - autofs4: does not take spinlock when not needed\n in autofs4_lookup_expiring (bnc#866130). - autofs4: factor\n should_expire() out\n of autofs4_expire_indirect (bnc#866130). - autofs4: make\n "autofs4_can_expire" idempotent (bnc#866130). - autofs4: remove a\n redundant assignment (bnc#866130). - autofs: fix lockref lookup\n (bnc#888591). - be2net: add dma_mapping_error() check for dma_map_page()\n (bnc#881759). - block: add cond_resched() to potentially long running\n ioctl discard loop (bnc#884725). - block: fix race between request\n completion and timeout handling (bnc#881051). - cdc-ether: clean packet\n filter upon probe (bnc#876017). - cpuset: Fix memory allocator deadlock\n (bnc#876590). - crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not\n all archs have them, but some are FIPS certified, with some kernel\n support. - crypto: fips\n - only panic on bad/missing crypto mod signatures (bnc#887503). - crypto:\n testmgr - allow aesni-intel and ghash_clmulni-intel in fips mode\n (bnc#889451). - dasd: validate request size before building CCW/TCW\n (bnc#891087, LTC#114068). - dm mpath: fix race condition between\n multipath_dtr and pg_init_done (bnc#826486). - dm-mpath: fix panic on\n deleting sg device (bnc#870161). - drm/ast: Add missing entry to\n dclk_table[]. - drm/ast: Add reduced non reduced mode parsing for wide\n screen mode (bnc#892723). - drm/i915: Only apply DPMS to the encoder if\n enabled (bnc#893064). - drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at\n driver init (bnc#869055). - drm/i915: create functions for the\n "unclaimed register" checks (bnc#869055). - drm/i915: use FPGA_DBG for\n the "unclaimed register" checks (bnc#869055). - drm/mgag200: Initialize\n data needed to map fbdev memory (bnc #806990). - e1000e: enable support\n for new device IDs (bnc#885509). - fs/fscache: remove spin_lock() from\n the condition in while() (bnc#880344). - hibernate: Disable in a signed\n modules environment (bnc#884333). - hugetlb: does not use ERR_PTR with\n VM_FAULT* values - ibmvscsi: Abort init sequence during error recovery\n (bnc#885382). - ibmvscsi: Add memory barriers for send / receive\n (bnc#885382). - inet: add a redirect generation id in inetpeer\n (bnc#860593). - inetpeer: initialize\n ->redirect_genid in inet_getpeer() (bnc#860593). - ipv6: tcp: fix\n tcp_v6_conn_request() (bnc#887645). - kabi: hide bnc#860593 changes of\n struct inetpeer_addr_base (bnc#860593). - kernel: 3215 tty hang\n (bnc#891087, LTC#114562). - kernel: fix data corruption when reading\n /proc/sysinfo (bnc#891087, LTC#114480). - kernel: fix kernel oops with\n load\n of fpc register (bnc#889061, LTC#113596). - kernel: sclp console tty\n reference counting (bnc#891087, LTC#115466). - kexec: Disable at runtime\n if the kernel enforces module loading restrictions (bnc#884333). -\n md/raid6: avoid data corruption during recovery of double-degraded RAID6.\n - memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim fix).\n - mm, hugetlb: add VM_NORESERVE check in vma_has_reserves() - mm,\n hugetlb: change variable name reservations to resv - mm, hugetlb:\n decrement reserve count if VM_NORESERVE alloc page cache - mm, hugetlb:\n defer freeing pages when gathering surplus pages - mm, hugetlb: do not\n use a page in page cache for cow optimization - mm, hugetlb: fix and\n clean-up node iteration code to alloc or free - mm, hugetlb: fix race in\n region tracking - mm, hugetlb: fix subpool accounting handling - mm,\n hugetlb: improve page-fault scalability - mm, hugetlb: improve, cleanup\n resv_map parameters - mm, hugetlb: move up the code which check\n availability of free huge page - mm, hugetlb: protect reserved pages when\n soft offlining a hugepage - mm, hugetlb: remove\n decrement_hugepage_resv_vma() - mm, hugetlb: remove redundant list_empty\n check in gather_surplus_pages() - mm, hugetlb: remove resv_map_put - mm,\n hugetlb: remove useless check about mapping type - mm, hugetlb: return a\n reserved page to a reserved pool if failed - mm, hugetlb: trivial\n commenting fix - mm, hugetlb: unify region structure handling - mm,\n hugetlb: unify region structure handling kabi - mm, hugetlb: use long\n vars instead of int in region_count() (Hugetlb Fault Scalability). - mm,\n hugetlb: use vma_resv_map() map types - mm, oom: fix badness score\n underflow (bnc#884582, bnc#884767). - mm, oom: normalize oom scores to\n oom_score_adj scale only for userspace (bnc#884582, bnc#884767). - mm,\n thp: do not allow thp faults to avoid cpuset restrictions (bnc#888849). -\n net/mlx4_core: Load higher level modules according to ports type\n (bnc#887680). - net/mlx4_core: Load the IB driver when the device\n supports IBoE (bnc#887680). - net/mlx4_en: Fix a race between napi poll\n function and RX ring cleanup (bnc#863586). - net/mlx4_en: Fix selftest\n failing on non 10G link speed (bnc#888058). - net: fix checksumming\n features handling in\n output path (bnc#891259). - perf/core: Add weighted samples (bnc#876114).\n - perf/x86: Add flags to event constraints (bnc#876114). - perf/x86: Add\n memory profiling via PEBS Load Latency (bnc#876114). - perf: Add generic\n memory sampling interface (bnc#876114). - qla2xxx: Avoid escalating the\n SCSI error handler if the command is not found in firmware (bnc#859840).\n - qla2xxx: Clear loop_id for ports that are marked lost during fabric\n scanning (bnc#859840). - qla2xxx: Does not check for firmware hung during\n the reset context for ISP82XX (bnc#859840). - qla2xxx: Issue abort\n command for outstanding commands during cleanup when only firmware is\n alive (bnc#859840). - qla2xxx: Reduce the time we wait for a command to\n complete during SCSI error handling (bnc#859840). - qla2xxx: Set host\n can_queue value based on available resources (bnc#859840). - restore\n smp_mb() in unlock_new_inode() (bnc#890526). - s390/pci: introduce lazy\n IOTLB flushing for DMA unmap (bnc#889061, LTC#113725). - sched: fix the\n theoretical signal_wake_up() vs schedule() race (bnc#876055). -\n sclp_vt220: Enable integrated ASCII console per default (bnc#885262,\n LTC#112035). - scsi_dh: use missing accessor "scsi_device_from_queue"\n (bnc#889614). - scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail\n (bnc#887608). - scsiback: correct grant page unmapping. - scsiback: fix\n retry handling in __report_luns(). - scsiback: free resources after\n error. - sunrpc/auth: allow lockless (rcu) lookup of credential cache\n (bnc#866130). - supported.conf: remove external from drivers/net/veth\n (bnc#889727) - supported.conf: support net/sched/act_police.ko\n (bnc#890426) - tcp: adapt selected parts of RFC 5682 and PRR logic\n (bnc#879921). - tg3: Change nvram command timeout value to 50ms\n (bnc#855657). - tg3: Override clock, link aware and link idle mode during\n NVRAM dump (bnc#855657). - tg3: Set the MAC clock to the fastest speed\n during boot code load (bnc#855657). - usb: Does not enable LPM if the\n exit latency is zero (bnc#832309). - usbcore: Does not log on consecutive\n debounce failures of the same port (bnc#888105). - usbhid: fix PIXART\n optical mouse (bnc#888607). - uswsusp: Disable when module loading is\n restricted (bnc#884333). - vscsi: support larger transfer sizes\n (bnc#774818). - x86 thermal: Delete power-limit-notification console\n messages (bnc#882317). - x86 thermal: Disable power limit notification\n interrupt by default (bnc#882317). - x86 thermal: Re-enable power limit\n notification interrupt by default (bnc#882317). - x86/UV: Add call to\n KGDB/KDB from NMI handler (bnc#888847). - x86/UV: Add kdump to UV NMI\n handler (bnc#888847). - x86/UV: Add summary of cpu activity to UV NMI\n handler (bnc#888847). - x86/UV: Move NMI support (bnc#888847). - x86/UV:\n Update UV support for external NMI signals (bnc#888847). - x86/uv/nmi:\n Fix Sparse warnings (bnc#888847). - x86: Lock down IO port access when\n module security is enabled (bnc#884333). - x86: Restrict MSR access when\n module loading is restricted (bnc#884333).\n\n Security Issues:\n\n * CVE-2013-1979\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979</a>>\n * CVE-2014-1739\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739</a>>\n * CVE-2014-2706\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706</a>>\n * CVE-2014-4027\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027</a>>\n * CVE-2014-4171\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171</a>>\n * CVE-2014-4508\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508</a>>\n * CVE-2014-4667\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667</a>>\n * CVE-2014-4943\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943</a>>\n * CVE-2014-5077\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077</a>>\n * CVE-2014-5471\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471</a>>\n * CVE-2014-5472\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472</a>>\n", "modified": "2014-10-22T21:04:47", "published": "2014-10-22T21:04:47", "href": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html", "id": "SUSE-SU-2014:1316-1", "title": "Security update for Linux kernel (important)", "type": "suse", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:08:53", "bulletinFamily": "unix", "cvelist": ["CVE-2014-5077", "CVE-2014-1739", "CVE-2014-4508", "CVE-2014-4943", "CVE-2014-4171", "CVE-2014-5472", "CVE-2014-4027", "CVE-2013-1979", "CVE-2014-3153", "CVE-2014-6410", "CVE-2014-5471", "CVE-2014-4667", "CVE-2014-2706"], "description": "The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix\n various bugs and security issues.\n\n The following security bugs have been fixed:\n\n *\n\n CVE-2014-1739: The media_device_enum_entities function in\n drivers/media/media-device.c in the Linux kernel before 3.14.6 does not\n initialize a certain data structure, which allows local users to\n obtain sensitive information from kernel memory by leveraging\n /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call\n (bnc#882804).\n\n *\n\n CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does\n not properly implement the interaction between range notification and hole\n punching, which allows local users to cause a denial of service (i_mutex\n hold) by using the mmap system call to access a hole, as demonstrated by\n interfering with intended shmem activity by blocking completion of (1) an\n MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call\n (bnc#883518).\n\n *\n\n CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel\n through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled\n and the sep CPU feature flag is set, allows local users to cause a denial\n of service (OOPS and system crash) via an invalid syscall number, as\n demonstrated by number 1000 (bnc#883724).\n\n *\n\n CVE-2014-4667: The sctp_association_free function in\n net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly\n manage a certain backlog value, which allows remote attackers to cause a\n denial of service (socket outage) via a crafted SCTP packet (bnc#885422).\n\n *\n\n CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the\n Linux kernel through 3.15.6 allows local users to gain privileges by\n leveraging data-structure differences between an l2tp socket and an inet\n socket (bnc#887082).\n\n *\n\n CVE-2014-5077: The sctp_assoc_update function in\n net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP\n authentication is enabled, allows remote attackers to cause a denial of\n service (NULL pointer dereference and OOPS) by starting to establish an\n association between two endpoints immediately after an exchange of INIT\n and INIT ACK chunks to establish an earlier association between these\n endpoints in the opposite direction (bnc#889173).\n\n *\n\n CVE-2014-5471: Stack consumption vulnerability in the\n parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux\n kernel through 3.16.1 allows local users to cause a denial of service\n (uncontrolled recursion, and system crash or reboot) via a crafted iso9660\n image with a CL entry referring to a directory entry that has a CL entry.\n (bnc#892490)\n\n *\n\n CVE-2014-5472: The parse_rock_ridge_inode_internal function in\n fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to\n cause a denial of service (unkillable mount process) via a crafted iso9660\n image with a self-referential CL entry. (bnc#892490)\n\n *\n\n CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux\n kernel before 3.13.7 allows remote attackers to cause a denial of service\n (system crash) via network traffic that improperly interacts with the\n WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and\n tx.c. (bnc#871797)\n\n *\n\n CVE-2014-4027: The rd_build_device_space function in\n drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not\n properly initialize a certain data structure, which allows local users to\n obtain sensitive information from ramdisk_mcp memory by leveraging access\n to a SCSI initiator. (bnc#882639)\n\n *\n\n CVE-2014-3153 The futex_requeue function in kernel/futex.c in the\n Linux kernel through 3.14.5 does not ensure that calls have two different\n futex addresses, which allows local users to gain privileges via a crafted\n FUTEX_REQUEUE command that facilitates unsafe waiter modification.\n (bnc#880892)\n\n *\n\n CVE-2014-6410: Avoid infinite loop when processing indirect ICBs\n (bnc#896689)\n\n The following non-security bugs have been fixed:\n\n * ACPI / PAD: call schedule() when need_resched() is true (bnc#866911).\n * ACPI: Fix bug when ACPI reset register is implemented in system\n memory (bnc#882900).\n * ACPI: Limit access to custom_method (bnc#884333).\n * ALSA: hda - Enabling Realtek ALC 671 codec (bnc#891746).\n * Add option to automatically enforce module signatures when in Secure\n Boot mode (bnc#884333).\n * Add secure_modules() call (bnc#884333).\n * Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344).\n * Backported new patches of Lock down functions for UEFI secure boot\n Also updated series.conf and removed old patches.\n * Btrfs: Return EXDEV for cross file system snapshot.\n * Btrfs: abort the transaction when we does not find our extent ref.\n * Btrfs: avoid warning bomb of btrfs_invalidate_inodes.\n * Btrfs: cancel scrub on transaction abortion.\n * Btrfs: correctly set profile flags on seqlock retry.\n * Btrfs: does not check nodes for extent items.\n * Btrfs: fix a possible deadlock between scrub and transaction\n committing.\n * Btrfs: fix corruption after write/fsync failure + fsync + log\n recovery (bnc#894200).\n * Btrfs: fix csum tree corruption, duplicate and outdated checksums\n (bnc#891619).\n * Btrfs: fix double free in find_lock_delalloc_range.\n * Btrfs: fix possible memory leak in btrfs_create_tree().\n * Btrfs: fix use of uninit "ret" in end_extent_writepage().\n * Btrfs: free delayed node outside of root->inode_lock (bnc#866864).\n * Btrfs: make DEV_INFO ioctl available to anyone.\n * Btrfs: make FS_INFO ioctl available to anyone.\n * Btrfs: make device scan less noisy.\n * Btrfs: make sure there are not any read requests before stopping\n workers.\n * Btrfs: more efficient io tree navigation on wait_extent_bit.\n * Btrfs: output warning instead of error when loading free space cache\n failed.\n * Btrfs: retrieve more info from FS_INFO ioctl.\n * Btrfs: return EPERM when deleting a default subvolume (bnc#869934).\n * Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol\n (bnc#866615).\n * Btrfs: use right type to get real comparison.\n * Btrfs: wake up @scrub_pause_wait as much as we can.\n * Btrfs: wake up transaction thread upon remount.\n * CacheFiles: Add missing retrieval completions (bnc#880344).\n * CacheFiles: Does not try to dump the index key if the cookie has\n been cleared (bnc#880344).\n * CacheFiles: Downgrade the requirements passed to the allocator\n (bnc#880344).\n * CacheFiles: Fix the marking of cached pages (bnc#880344).\n * CacheFiles: Implement invalidation (bnc#880344).\n * CacheFiles: Make some debugging statements conditional (bnc#880344).\n * Drivers: hv: util: Fix a bug in the KVP code (bnc#886840).\n * Drivers: hv: vmbus: Fix a bug in the channel callback dispatch code\n (bnc#886840).\n * FS-Cache: Add transition to handle invalidate immediately after\n lookup (bnc#880344).\n * FS-Cache: Check that there are no read ops when cookie relinquished\n (bnc#880344).\n * FS-Cache: Clear remaining page count on retrieval cancellation\n (bnc#880344).\n * FS-Cache: Convert the object event ID #defines into an enum\n (bnc#880344).\n * FS-Cache: Does not sleep in page release if __GFP_FS is not set\n (bnc#880344).\n * FS-Cache: Does not use spin_is_locked() in assertions (bnc#880344).\n * FS-Cache: Exclusive op submission can BUG if there is been an I/O\n error (bnc#880344).\n * FS-Cache: Fix __wait_on_atomic_t() to call the action func if the\n counter != 0 (bnc#880344).\n * FS-Cache: Fix object state machine to have separate work and wait\n states (bnc#880344).\n * FS-Cache: Fix operation state management and accounting (bnc#880344).\n * FS-Cache: Fix signal handling during waits (bnc#880344).\n * FS-Cache: Initialise the object event mask with the calculated mask\n (bnc#880344).\n * FS-Cache: Limit the number of I/O error reports for a cache\n (bnc#880344).\n * FS-Cache: Make cookie relinquishment wait for outstanding reads\n (bnc#880344).\n * FS-Cache: Mark cancellation of in-progress operation (bnc#880344).\n * FS-Cache: One of the write operation paths doeses not set the object\n state (bnc#880344).\n * FS-Cache: Provide proper invalidation (bnc#880344).\n * FS-Cache: Simplify cookie retention for fscache_objects, fixing oops\n (bnc#880344).\n * FS-Cache: The retrieval remaining-pages counter needs to be atomic_t\n (bnc#880344).\n * FS-Cache: Uninline fscache_object_init() (bnc#880344).\n * FS-Cache: Wrap checks on object state (bnc#880344).\n * HID: usbhid: add always-poll quirk (bnc#888607).\n * HID: usbhid: enable always-poll quirk for Elan Touchscreen\n (bnc#888607).\n * IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297).\n * Ignore "flags" change to event_constraint (bnc#876114).\n * Ignore data_src/weight changes to perf_sample_data (bnc#876114).\n * NFS: Allow more operations in an NFSv4.1 request (bnc#890513).\n * NFS: Clean up helper function nfs4_select_rw_stateid() (bnc#888968).\n * NFS: Does not copy read delegation stateids in setattr (bnc#888968).\n * NFS: Does not use a delegation to open a file when returning that\n delegation (bnc#888968, bnc#892200, bnc#893596, bnc#893496)\n * NFS: Fixes for NFS RCU-walk support in line with code going upstream\n * NFS: Use FS-Cache invalidation (bnc#880344).\n * NFS: allow lockless access to access_cache (bnc#866130).\n * NFS: avoid mountpoint being displayed as " (deleted)" in\n /proc/mounts (bnc#888591).\n * NFS: nfs4_do_open should add negative results to the dcache\n (bnc#866130).\n * NFS: nfs_migrate_page() does not wait for FS-Cache to finish with a\n page (bnc#880344).\n * NFS: nfs_open_revalidate: only evaluate parent if it will be used\n (bnc#866130).\n * NFS: prepare for RCU-walk support but pushing tests later in code\n (bnc#866130).\n * NFS: support RCU_WALK in nfs_permission() (bnc#866130).\n * NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130).\n * NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130).\n * NFSD: Does not hand out delegations for 30 seconds after recalling\n them (bnc#880370).\n * NFSv4 set open access operation call flag in nfs4_init_opendata_res\n (bnc#888968, bnc#892200, bnc#893596, bnc#893496).\n * NFSv4: Add a helper for encoding opaque data (bnc#888968).\n * NFSv4: Add a helper for encoding stateids (bnc#888968).\n * NFSv4: Add helpers for basic copying of stateids (bnc#888968).\n * NFSv4: Clean up nfs4_select_rw_stateid() (bnc#888968).\n * NFSv4: Fix the return value of nfs4_select_rw_stateid (bnc#888968).\n * NFSv4: Rename nfs4_copy_stateid() (bnc#888968).\n * NFSv4: Resend the READ/WRITE RPC call if a stateid change causes an\n error (bnc#888968).\n * NFSv4: Simplify the struct nfs4_stateid (bnc#888968).\n * NFSv4: The stateid must remain the same for replayed RPC calls\n (bnc#888968).\n * NFSv4: nfs4_stateid_is_current should return "true" for an invalid\n stateid (bnc#888968).\n * One more fix for kABI breakage.\n * PCI: Lock down BAR access when module security is enabled\n (bnc#884333).\n * PCI: enable MPS "performance" setting to properly handle bridge MPS\n (bnc#883376).\n * PM / Hibernate: Add memory_rtree_find_bit function (bnc#860441).\n * PM / Hibernate: Create a Radix-Tree to store memory bitmap\n (bnc#860441).\n * PM / Hibernate: Implement position keeping in radix tree\n (bnc#860441).\n * PM / Hibernate: Iterate over set bits instead of PFNs in\n swsusp_free() (bnc#860441).\n * PM / Hibernate: Remove the old memory-bitmap implementation\n (bnc#860441).\n * PM / Hibernate: Touch Soft Lockup Watchdog in rtree_next_node\n (bnc#860441).\n * Restrict /dev/mem and /dev/kmem when module loading is restricted\n (bnc#884333).\n * Reuse existing "state" field to indicate PERF_X86_EVENT_PEBS_LDLAT\n (bnc#876114).\n * USB: handle LPM errors during device suspend correctly (bnc#849123).\n * Update kabi files to reflect fscache change (bnc#880344)\n * Update x86_64 config files: re-enable SENSORS_W83627EHF (bnc#891281)\n * VFS: Make more complete truncate operation available to CacheFiles\n (bnc#880344).\n * [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger (FATE#83366,\n ltc#83367).\n * acpi: Ignore acpi_rsdp kernel parameter when module loading is\n restricted (bnc#884333).\n * af_iucv: correct cleanup if listen backlog is full (bnc#885262,\n LTC#111728).\n * asus-wmi: Restrict debugfs interface when module loading is\n restricted (bnc#884333).\n * autofs4: allow RCU-walk to walk through autofs4 (bnc#866130).\n * autofs4: avoid taking fs_lock during rcu-walk (bnc#866130).\n * autofs4: does not take spinlock when not needed in\n autofs4_lookup_expiring (bnc#866130).\n * autofs4: factor should_expire() out of autofs4_expire_indirect\n (bnc#866130).\n * autofs4: make "autofs4_can_expire" idempotent (bnc#866130).\n * autofs4: remove a redundant assignment (bnc#866130).\n * autofs: fix lockref lookup (bnc#888591).\n * be2net: add dma_mapping_error() check for dma_map_page()\n (bnc#881759).\n * block: add cond_resched() to potentially long running ioctl discard\n loop (bnc#884725).\n * block: fix race between request completion and timeout handling\n (bnc#881051).\n * cdc-ether: clean packet filter upon probe (bnc#876017).\n * cpuset: Fix memory allocator deadlock (bnc#876590).\n * crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs\n have them, but some are FIPS certified, with some kernel support.\n * crypto: fips - only panic on bad/missing crypto mod signatures\n (bnc#887503).\n * crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips\n mode (bnc#889451).\n * dasd: validate request size before building CCW/TCW (bnc#891087,\n LTC#114068).\n * dm mpath: fix race condition between multipath_dtr and pg_init_done\n (bnc#826486).\n * dm-mpath: fix panic on deleting sg device (bnc#870161).\n * drm/ast: AST2000 cannot be detected correctly (bnc#895983).\n * drm/ast: Actually load DP501 firmware when required (bnc#895608\n bnc#871134).\n * drm/ast: Add missing entry to dclk_table[].\n * drm/ast: Add reduced non reduced mode parsing for wide screen mode\n (bnc#892723).\n * drm/ast: initial DP501 support (v0.2) (bnc#871134).\n * drm/ast: open key before detect chips (bnc#895983).\n * drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304).\n * drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064).\n * drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init\n (bnc#869055).\n * drm/i915: create functions for the "unclaimed register" checks\n (bnc#869055).\n * drm/i915: use FPGA_DBG for the "unclaimed register" checks\n (bnc#869055).\n * drm/mgag200: Initialize data needed to map fbdev memory (bnc\n #806990).\n * e1000e: enable support for new device IDs (bnc#885509).\n * fs/fscache: remove spin_lock() from the condition in while()\n (bnc#880344).\n * hibernate: Disable in a signed modules environment (bnc#884333).\n * hugetlb: does not use ERR_PTR with VM_FAULT* values\n * ibmvscsi: Abort init sequence during error recovery (bnc#885382).\n * ibmvscsi: Add memory barriers for send / receive (bnc#885382).\n * inet: add a redirect generation id in inetpeer (bnc#860593).\n * inetpeer: initialize ->redirect_genid in inet_getpeer() (bnc#860593).\n * ipv6: tcp: fix tcp_v6_conn_request() (bnc#887645).\n * kabi: hide bnc#860593 changes of struct inetpeer_addr_base\n (bnc#860593).\n * kernel: 3215 tty hang (bnc#891087, LTC#114562).\n * kernel: fix data corruption when reading /proc/sysinfo (bnc#891087,\n LTC#114480).\n * kernel: fix kernel oops with load of fpc register (bnc#889061,\n LTC#113596).\n * kernel: sclp console tty reference counting (bnc#891087, LTC#115466).\n * kexec: Disable at runtime if the kernel enforces module loading\n restrictions (bnc#884333).\n * md/raid6: avoid data corruption during recovery of double-degraded\n RAID6.\n * memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim\n fix).\n * memcg: do not expose uninitialized mem_cgroup_per_node to world\n (bnc#883096).\n * mm, hugetlb: add VM_NORESERVE check in vma_has_reserves()\n * mm, hugetlb: change variable name reservations to resv\n * mm, hugetlb: decrement reserve count if VM_NORESERVE alloc page cache\n * mm, hugetlb: defer freeing pages when gathering surplus pages\n * mm, hugetlb: do not use a page in page cache for cow optimization\n * mm, hugetlb: fix and clean-up node iteration code to alloc or free\n * mm, hugetlb: fix race in region tracking\n * mm, hugetlb: fix subpool accounting handling\n * mm, hugetlb: improve page-fault scalability\n * mm, hugetlb: improve, cleanup resv_map parameters\n * mm, hugetlb: move up the code which check availability of free huge\n page\n * mm, hugetlb: protect reserved pages when soft offlining a hugepage\n * mm, hugetlb: remove decrement_hugepage_resv_vma()\n * mm, hugetlb: remove redundant list_empty check in\n gather_surplus_pages()\n * mm, hugetlb: remove resv_map_put\n * mm, hugetlb: remove useless check about mapping type\n * mm, hugetlb: return a reserved page to a reserved pool if failed\n * mm, hugetlb: trivial commenting fix\n * mm, hugetlb: unify region structure handling\n * mm, hugetlb: unify region structure handling kabi\n * mm, hugetlb: use long vars instead of int in region_count() (Hugetlb\n Fault Scalability).\n * mm, hugetlb: use vma_resv_map() map types\n * mm, oom: fix badness score underflow (bnc#884582, bnc#884767).\n * mm, oom: normalize oom scores to oom_score_adj scale only for\n userspace (bnc#884582, bnc#884767).\n * mm, thp: do not allow thp faults to avoid cpuset restrictions\n (bnc#888849).\n * net/mlx4_core: Load higher level modules according to ports type\n (bnc#887680).\n * net/mlx4_core: Load the IB driver when the device supports IBoE\n (bnc#887680).\n * net/mlx4_en: Fix a race between napi poll function and RX ring\n cleanup (bnc#863586).\n * net/mlx4_en: Fix selftest failing on non 10G link speed (bnc#888058).\n * net: fix checksumming features handling in output path (bnc#891259).\n * pagecache_limit: batch large nr_to_scan targets (bnc#895221).\n * pagecachelimit: reduce lru_lock congestion for heavy parallel\n reclaim fix (bnc#895680).\n * perf/core: Add weighted samples (bnc#876114).\n * perf/x86: Add flags to event constraints (bnc#876114).\n * perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114).\n * perf: Add generic memory sampling interface (bnc#876114).\n * qla2xxx: Avoid escalating the SCSI error handler if the command is\n not found in firmware (bnc#859840).\n * qla2xxx: Clear loop_id for ports that are marked lost during fabric\n scanning (bnc#859840).\n * qla2xxx: Does not check for firmware hung during the reset context\n for ISP82XX (bnc#859840).\n * qla2xxx: Issue abort command for outstanding commands during cleanup\n when only firmware is alive (bnc#859840).\n * qla2xxx: Reduce the time we wait for a command to complete during\n SCSI error handling (bnc#859840).\n * qla2xxx: Set host can_queue value based on available resources\n (bnc#859840).\n * restore smp_mb() in unlock_new_inode() (bnc#890526).\n * s390/pci: introduce lazy IOTLB flushing for DMA unmap (bnc#889061,\n LTC#113725).\n * sched: fix the theoretical signal_wake_up() vs schedule() race\n (bnc#876055).\n * sclp_vt220: Enable integrated ASCII console per default (bnc#885262,\n LTC#112035).\n * scsi_dh: use missing accessor "scsi_device_from_queue" (bnc#889614).\n * scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608).\n * scsiback: correct grant page unmapping.\n * scsiback: fix retry handling in __report_luns().\n * scsiback: free resources after error.\n * sunrpc/auth: allow lockless (rcu) lookup of credential cache\n (bnc#866130).\n * supported.conf: remove external from drivers/net/veth (bnc#889727)\n * supported.conf: support net/sched/act_police.ko (bnc#890426)\n * tcp: adapt selected parts of RFC 5682 and PRR logic (bnc#879921).\n * tg3: Change nvram command timeout value to 50ms (bnc#855657).\n * tg3: Override clock, link aware and link idle mode during NVRAM dump\n (bnc#855657).\n * tg3: Set the MAC clock to the fastest speed during boot code load\n (bnc#855657).\n * usb: Does not enable LPM if the exit latency is zero (bnc#832309).\n * usbcore: Does not log on consecutive debounce failures of the same\n port (bnc#888105).\n * usbhid: fix PIXART optical mouse (bnc#888607).\n * uswsusp: Disable when module loading is restricted (bnc#884333).\n * vscsi: support larger transfer sizes (bnc#774818).\n * writeback: Do not sync data dirtied after sync start (bnc#833820).\n * x86 thermal: Delete power-limit-notification console messages\n (bnc#882317).\n * x86 thermal: Disable power limit notification interrupt by default\n (bnc#882317).\n * x86 thermal: Re-enable power limit notification interrupt by default\n (bnc#882317).\n * x86, cpu hotplug: Fix stack frame warning in\n check_irq_vectors_for_cpu_disable() (bnc#887418).\n * x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847).\n * x86/UV: Add kdump to UV NMI handler (bnc#888847).\n * x86/UV: Add summary of cpu activity to UV NMI handler (bnc#888847).\n * x86/UV: Move NMI support (bnc#888847).\n * x86/UV: Update UV support for external NMI signals (bnc#888847).\n * x86/uv/nmi: Fix Sparse warnings (bnc#888847).\n * x86: Add check for number of available vectors before CPU down\n (bnc#887418).\n * x86: Lock down IO port access when module security is enabled\n (bnc#884333).\n * x86: Restrict MSR access when module loading is restricted\n (bnc#884333).\n\n Security Issues:\n\n * CVE-2013-1979\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979</a>>\n * CVE-2014-1739\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739</a>>\n * CVE-2014-2706\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706</a>>\n * CVE-2014-4027\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027</a>>\n * CVE-2014-4171\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171</a>>\n * CVE-2014-4508\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508</a>>\n * CVE-2014-4667\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667</a>>\n * CVE-2014-4943\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943</a>>\n * CVE-2014-5077\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077</a>>\n * CVE-2014-5471\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471</a>>\n * CVE-2014-5472\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472</a>>\n * CVE-2014-3153\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153</a>>\n * CVE-2014-6410\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410</a>>\n\n The SUSE Linux Enterprise 11 Service Pack 3 RealTime Extension kernel was\n updated to fix various bugs and security issues.\n\n Following security bugs were fixed: CVE-2013-1979: The scm_set_cred\n function in include/net/scm.h in the Linux kernel before 3.8.11 uses\n incorrect uid and gid values during credentials passing, which allows\n local users to gain privileges via a crafted application (bnc#816708).\n\n CVE-2014-1739: The media_device_enum_entities function in\n drivers/media/media-device.c in the Linux kernel before 3.14.6 does not\n initialize a certain data structure, which allows local users to obtain\n sensitive information from kernel memory by leveraging /dev/media0 read\n access for a MEDIA_IOC_ENUM_ENTITIES ioctl call (bnc#882804).\n\n CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not\n properly implement the interaction between range notification and hole\n punching, which allows local users to cause a denial of service (i_mutex\n hold) by using the mmap system call to access a hole, as demonstrated by\n interfering with intended shmem activity by blocking completion of (1) an\n MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call\n (bnc#883518).\n\n CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through\n 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the\n sep CPU feature flag is set, allows local users to cause a denial of\n service (OOPS and system crash) via an invalid syscall number, as\n demonstrated by number 1000 (bnc#883724).\n\n CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c\n in the Linux kernel before 3.15.2 does not properly manage a certain\n backlog value, which allows remote attackers to cause a denial of service\n (socket outage) via a crafted SCTP packet (bnc#885422).\n\n CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux\n kernel through 3.15.6 allows local users to gain privileges by leveraging\n data-structure differences between an l2tp socket and an inet socket\n (bnc#887082).\n\n CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in\n the Linux kernel through 3.15.8, when SCTP authentication is enabled,\n allows remote attackers to cause a denial of service (NULL pointer\n dereference and OOPS) by starting to establish an association between two\n endpoints immediately after an exchange of INIT and INIT ACK chunks to\n establish an earlier association between these endpoints in the opposite\n direction (bnc#889173).\n\n CVE-2014-5471: Stack consumption vulnerability in the\n parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux\n kernel through 3.16.1 allows local users to cause a denial of service\n (uncontrolled recursion, and system crash or reboot) via a crafted iso9660\n image with a CL entry referring to a directory entry that has a CL entry.\n (bnc#892490)\n\n CVE-2014-5472: The parse_rock_ridge_inode_internal function in\n fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to\n cause a denial of service (unkillable mount process) via a crafted iso9660\n image with a self-referential CL entry. (bnc#892490)\n\n CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux\n kernel before 3.13.7 allows remote attackers to cause a denial of service\n (system crash) via network traffic that improperly interacts with the\n WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and\n tx.c. (bnc#871797)\n\n CVE-2014-4027: The rd_build_device_space function in\n drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not\n properly initialize a certain data structure, which allows local users to\n obtain sensitive information from ramdisk_mcp memory by leveraging access\n to a SCSI initiator. (bnc#882639)\n\n CVE-2014-3153 The futex_requeue function in kernel/futex.c in the Linux\n kernel through 3.14.5 does not ensure that calls have two different futex\n addresses, which allows local users to gain privileges via a crafted\n FUTEX_REQUEUE command that facilitates unsafe waiter modification.\n (bnc#880892)\n\n CVE-2014-6410: Avoid infinite loop when processing indirect ICBs\n (bnc#896689)\n\n The following non-security bugs were fixed: - ACPI / PAD: call schedule()\n when need_resched() is true (bnc#866911). - ACPI: Fix bug when ACPI reset\n register is implemented in system memory (bnc#882900). - ACPI: Limit\n access to custom_method (bnc#884333). - ALSA: hda - Enabling Realtek ALC\n 671 codec (bnc#891746). - Add option to automatically enforce module\n signatures when in Secure Boot mode (bnc#884333). - Add secure_modules()\n call (bnc#884333).\n - Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344). - Backported\n new patches of Lock down functions for UEFI secure boot Also updated\n series.conf and removed old patches. - Btrfs: Return EXDEV for cross\n file system snapshot. - Btrfs: abort the transaction when we does not\n find our extent ref. - Btrfs: avoid warning bomb of\n btrfs_invalidate_inodes. - Btrfs: cancel scrub on transaction abortion.\n - Btrfs: correctly set profile flags on seqlock retry. - Btrfs: does not\n check nodes for extent items. - Btrfs: fix a possible deadlock between\n scrub and transaction committing. - Btrfs: fix corruption after\n write/fsync failure + fsync + log recovery (bnc#894200). - Btrfs: fix\n csum tree corruption, duplicate and outdated checksums (bnc#891619). -\n Btrfs: fix double free in find_lock_delalloc_range. - Btrfs: fix\n possible memory leak in btrfs_create_tree(). - Btrfs: fix use of uninit\n "ret" in end_extent_writepage(). - Btrfs: free delayed node outside of\n root->inode_lock (bnc#866864). - Btrfs: make DEV_INFO ioctl available to\n anyone. - Btrfs: make FS_INFO ioctl available to anyone. - Btrfs: make\n device scan less noisy. - Btrfs: make sure there are not any read\n requests before stopping workers. - Btrfs: more efficient io tree\n navigation on wait_extent_bit. - Btrfs: output warning instead of error\n when loading free space cache failed. - Btrfs: retrieve more info from\n FS_INFO ioctl. - Btrfs: return EPERM when deleting a default subvolume\n (bnc#869934). - Btrfs: unset DCACHE_DISCONNECTED when mounting default\n subvol (bnc#866615).\n - Btrfs: use right type to get real comparison. - Btrfs: wake up\n @scrub_pause_wait as much as we can. - Btrfs: wake up transaction thread\n upon remount. - CacheFiles: Add missing retrieval completions\n (bnc#880344).\n - CacheFiles: Does not try to dump the index key if the cookie has been\n cleared (bnc#880344). - CacheFiles: Downgrade the requirements passed to\n the allocator (bnc#880344). - CacheFiles: Fix the marking of cached\n pages (bnc#880344). - CacheFiles: Implement invalidation (bnc#880344). -\n CacheFiles: Make some debugging statements conditional (bnc#880344). -\n Drivers: hv: util: Fix a bug in the KVP code (bnc#886840). - Drivers:\n hv: vmbus: Fix a bug in the channel callback dispatch code (bnc#886840).\n - FS-Cache: Add transition to handle invalidate immediately after lookup\n (bnc#880344). - FS-Cache: Check that there are no read ops when cookie\n relinquished (bnc#880344). - FS-Cache: Clear remaining page count on\n retrieval cancellation (bnc#880344). - FS-Cache: Convert the object\n event ID #defines into an enum (bnc#880344). - FS-Cache: Does not sleep\n in page release if __GFP_FS is not set (bnc#880344). - FS-Cache: Does\n not use spin_is_locked() in assertions (bnc#880344). - FS-Cache:\n Exclusive op submission can BUG if there is been an I/O error\n (bnc#880344). - FS-Cache: Fix __wait_on_atomic_t() to call the action\n func if the counter != 0 (bnc#880344). - FS-Cache: Fix object state\n machine to have separate work and wait states (bnc#880344). - FS-Cache:\n Fix operation state management and accounting (bnc#880344). - FS-Cache:\n Fix signal handling during waits (bnc#880344). - FS-Cache: Initialise\n the object event mask with the calculated mask (bnc#880344). - FS-Cache:\n Limit the number of I/O error reports for a cache (bnc#880344). -\n FS-Cache: Make cookie relinquishment wait for outstanding reads\n (bnc#880344). - FS-Cache: Mark cancellation of in-progress operation\n (bnc#880344). - FS-Cache: One of the write operation paths doeses not\n set the object state (bnc#880344). - FS-Cache: Provide proper\n invalidation (bnc#880344). - FS-Cache: Simplify cookie retention for\n fscache_objects, fixing oops (bnc#880344). - FS-Cache: The retrieval\n remaining-pages counter needs to be atomic_t (bnc#880344). - FS-Cache:\n Uninline fscache_object_init() (bnc#880344). - FS-Cache: Wrap checks on\n object state (bnc#880344). - HID: usbhid: add always-poll quirk\n (bnc#888607). - HID: usbhid: enable always-poll quirk for Elan\n Touchscreen (bnc#888607). - IB/iser: Add TIMEWAIT_EXIT event handling\n (bnc#890297). - Ignore "flags" change to event_constraint (bnc#876114). -\n Ignore data_src/weight changes to perf_sample_data (bnc#876114). - NFS:\n Allow more\n operations in an NFSv4.1 request (bnc#890513). - NFS: Clean up helper\n function nfs4_select_rw_stateid() (bnc#888968). - NFS: Does not copy read\n delegation stateids in setattr (bnc#888968). - NFS: Does not use a\n delegation to open a file when returning that delegation (bnc#888968,\n bnc#892200, bnc#893596, bnc#893496) - NFS: Fixes for NFS RCU-walk support\n in line with code going upstream - NFS: Use FS-Cache invalidation\n (bnc#880344). - NFS: allow lockless access to access_cache (bnc#866130).\n - NFS: avoid mountpoint being displayed as " (deleted)" in /proc/mounts\n (bnc#888591). - NFS: nfs4_do_open should add negative results to the\n dcache (bnc#866130). - NFS: nfs_migrate_page() does not wait for FS-Cache\n to finish with a page (bnc#880344). - NFS: nfs_open_revalidate: only\n evaluate parent if it will be used (bnc#866130). - NFS: prepare for\n RCU-walk support but pushing tests later in code (bnc#866130). - NFS:\n support RCU_WALK in nfs_permission() (bnc#866130). - NFS: teach\n nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130). - NFS: teach\n nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130). - NFSD: Does\n not hand out delegations for 30 seconds after recalling them\n (bnc#880370). - NFSv4 set open access\n operation call flag in nfs4_init_opendata_res (bnc#888968, bnc#892200,\n bnc#893596, bnc#893496). - NFSv4: Add a helper for encoding opaque data\n (bnc#888968). - NFSv4: Add a helper for encoding stateids (bnc#888968). -\n NFSv4: Add helpers for basic copying of stateids (bnc#888968). - NFSv4:\n Clean up nfs4_select_rw_stateid() (bnc#888968). - NFSv4: Fix the return\n value of nfs4_select_rw_stateid (bnc#888968). - NFSv4: Rename\n nfs4_copy_stateid() (bnc#888968). - NFSv4: Resend the READ/WRITE RPC call\n if a stateid change causes an error (bnc#888968). - NFSv4: Simplify the\n struct nfs4_stateid (bnc#888968). - NFSv4: The stateid must remain the\n same for replayed RPC calls (bnc#888968). - NFSv4:\n nfs4_stateid_is_current should return "true" for an invalid stateid\n (bnc#888968). - One more fix for kABI breakage. - PCI: Lock down BAR\n access when module security is enabled (bnc#884333). - PCI: enable MPS\n "performance" setting to properly handle bridge MPS (bnc#883376). - PM /\n Hibernate: Add memory_rtree_find_bit function (bnc#860441). - PM /\n Hibernate: Create a Radix-Tree to store memory bitmap (bnc#860441). - PM\n / Hibernate: Implement position keeping in radix tree (bnc#860441). - PM\n / Hibernate: Iterate over set bits instead of PFNs in swsusp_free()\n (bnc#860441). - PM / Hibernate: Remove the old memory-bitmap\n implementation (bnc#860441). - PM / Hibernate: Touch Soft Lockup Watchdog\n in rtree_next_node (bnc#860441). - Restrict /dev/mem and /dev/kmem when\n module loading is restricted (bnc#884333). - Reuse existing "state" field\n to indicate PERF_X86_EVENT_PEBS_LDLAT (bnc#876114). - USB: handle LPM\n errors during device suspend correctly (bnc#849123). - Update kabi files\n to reflect fscache change (bnc#880344) - Update x86_64 config files:\n re-enable SENSORS_W83627EHF (bnc#891281) - VFS: Make more complete\n truncate operation available to CacheFiles (bnc#880344). - [FEAT NET1222]\n ib_uverbs: Allow explicit mmio trigger (FATE#83366, ltc#83367). - acpi:\n Ignore acpi_rsdp kernel parameter when module loading is restricted\n (bnc#884333). - af_iucv: correct cleanup if listen backlog is full\n (bnc#885262, LTC#111728). - asus-wmi: Restrict debugfs interface when\n module loading is restricted (bnc#884333). - autofs4: allow RCU-walk to\n walk through autofs4 (bnc#866130). - autofs4: avoid taking fs_lock during\n rcu-walk (bnc#866130). - autofs4: does not take spinlock when not needed\n in autofs4_lookup_expiring (bnc#866130). - autofs4: factor\n should_expire() out\n of autofs4_expire_indirect (bnc#866130). - autofs4: make\n "autofs4_can_expire" idempotent (bnc#866130). - autofs4: remove a\n redundant assignment (bnc#866130). - autofs: fix lockref lookup\n (bnc#888591). - be2net: add dma_mapping_error() check for dma_map_page()\n (bnc#881759). - block: add cond_resched() to potentially long running\n ioctl discard loop (bnc#884725). - block: fix race between request\n completion and timeout handling (bnc#881051). - cdc-ether: clean packet\n filter upon probe (bnc#876017). - cpuset: Fix memory allocator deadlock\n (bnc#876590). - crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not\n all archs have them, but some are FIPS certified, with some kernel\n support. - crypto: fips\n - only panic on bad/missing crypto mod signatures (bnc#887503). - crypto:\n testmgr - allow aesni-intel and ghash_clmulni-intel in fips mode\n (bnc#889451). - dasd: validate request size before building CCW/TCW\n (bnc#891087, LTC#114068). - dm mpath: fix race condition between\n multipath_dtr and pg_init_done (bnc#826486). - dm-mpath: fix panic on\n deleting sg device (bnc#870161). - drm/ast: AST2000 cannot be detected\n correctly (bnc#895983). - drm/ast: Actually load DP501 firmware when\n required (bnc#895608 bnc#871134). - drm/ast: Add missing entry to\n dclk_table[]. - drm/ast: Add reduced non reduced mode parsing for wide\n screen mode (bnc#892723). - drm/ast: initial DP501 support (v0.2)\n (bnc#871134). - drm/ast: open key before detect chips (bnc#895983). -\n drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304). -\n drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064). -\n drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init (bnc#869055).\n - drm/i915: create functions for the "unclaimed register" checks\n (bnc#869055). - drm/i915: use FPGA_DBG for the "unclaimed register"\n checks (bnc#869055). - drm/mgag200: Initialize data needed to map fbdev\n memory (bnc #806990). - e1000e: enable support for new device IDs\n (bnc#885509). - fs/fscache: remove spin_lock() from the condition in\n while() (bnc#880344).\n - hibernate: Disable in a signed modules environment (bnc#884333). -\n hugetlb: does not use ERR_PTR with VM_FAULT* values - ibmvscsi: Abort\n init sequence during error recovery (bnc#885382). - ibmvscsi: Add memory\n barriers for send / receive (bnc#885382). - inet: add a redirect\n generation id in inetpeer (bnc#860593). - inetpeer: initialize\n ->redirect_genid in inet_getpeer() (bnc#860593). - ipv6: tcp: fix\n tcp_v6_conn_request() (bnc#887645). - kabi: hide bnc#860593 changes of\n struct inetpeer_addr_base (bnc#860593). - kernel: 3215 tty hang\n (bnc#891087, LTC#114562). - kernel: fix data corruption when reading\n /proc/sysinfo (bnc#891087, LTC#114480). - kernel: fix kernel oops with\n load of fpc register (bnc#889061, LTC#113596).\n - kernel: sclp console tty reference counting (bnc#891087, LTC#115466). -\n kexec: Disable at runtime if the kernel enforces module loading\n restrictions (bnc#884333). - md/raid6: avoid data corruption during\n recovery of double-degraded RAID6. - memcg, vmscan: Fix forced scan of\n anonymous pages (memory reclaim fix). - memcg: do not expose\n uninitialized mem_cgroup_per_node to world (bnc#883096). - mm, hugetlb:\n add VM_NORESERVE check in vma_has_reserves() - mm, hugetlb: change\n variable name reservations to resv - mm, hugetlb: decrement reserve\n count if VM_NORESERVE alloc page cache - mm, hugetlb: defer freeing\n pages when gathering surplus pages - mm, hugetlb: do not use a page in\n page cache for cow optimization - mm, hugetlb: fix and clean-up node\n iteration code to alloc or free - mm, hugetlb: fix race in region\n tracking - mm, hugetlb: fix subpool accounting handling - mm, hugetlb:\n improve page-fault scalability - mm, hugetlb: improve, cleanup resv_map\n parameters - mm, hugetlb: move up the code which check availability of\n free huge page - mm, hugetlb: protect reserved pages when soft offlining\n a hugepage - mm, hugetlb: remove decrement_hugepage_resv_vma() - mm,\n hugetlb: remove redundant list_empty check in gather_surplus_pages() -\n mm, hugetlb: remove resv_map_put - mm, hugetlb: remove useless check\n about mapping type - mm, hugetlb: return a reserved page to a reserved\n pool if failed - mm, hugetlb: trivial commenting fix - mm, hugetlb:\n unify region structure handling - mm, hugetlb: unify region structure\n handling kabi - mm, hugetlb: use long vars instead of int in\n region_count() (Hugetlb Fault Scalability). - mm, hugetlb: use\n vma_resv_map() map types - mm, oom: fix badness score underflow\n (bnc#884582, bnc#884767). - mm, oom: normalize oom scores to\n oom_score_adj scale only for userspace (bnc#884582, bnc#884767). - mm,\n thp: do not allow thp faults to avoid cpuset restrictions (bnc#888849). -\n net/mlx4_core: Load higher level modules according to ports type\n (bnc#887680). - net/mlx4_core: Load the IB driver when the device\n supports IBoE (bnc#887680). - net/mlx4_en: Fix a race between napi poll\n function and RX ring cleanup (bnc#863586). - net/mlx4_en: Fix selftest\n failing on non 10G link speed (bnc#888058). - net: fix checksumming\n features handling in\n output path (bnc#891259). - pagecache_limit: batch large nr_to_scan\n targets (bnc#895221). - pagecachelimit: reduce lru_lock congestion for\n heavy parallel reclaim fix (bnc#895680). - perf/core: Add weighted\n samples (bnc#876114). - perf/x86: Add flags to event constraints\n (bnc#876114). - perf/x86: Add memory profiling via PEBS Load Latency\n (bnc#876114). - perf: Add generic memory sampling interface (bnc#876114).\n - qla2xxx: Avoid escalating the SCSI error handler if the command is not\n found in firmware (bnc#859840). - qla2xxx: Clear loop_id for ports that\n are marked lost during fabric scanning (bnc#859840). - qla2xxx: Does not\n check for firmware hung during the reset context for ISP82XX\n (bnc#859840). - qla2xxx: Issue abort command for outstanding commands\n during cleanup when only firmware is alive (bnc#859840). - qla2xxx:\n Reduce the time we wait for a command to complete during SCSI error\n handling (bnc#859840). - qla2xxx: Set host can_queue value based on\n available resources (bnc#859840). - restore smp_mb() in\n unlock_new_inode() (bnc#890526). - s390/pci: introduce lazy IOTLB\n flushing for DMA unmap (bnc#889061, LTC#113725). - sched: fix the\n theoretical signal_wake_up() vs schedule() race (bnc#876055). -\n sclp_vt220: Enable integrated ASCII console per default (bnc#885262,\n LTC#112035). - scsi_dh: use missing accessor "scsi_device_from_queue"\n (bnc#889614). - scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail\n (bnc#887608). - scsiback: correct grant page unmapping. - scsiback: fix\n retry handling in __report_luns(). - scsiback: free resources after\n error. - sunrpc/auth: allow lockless (rcu) lookup of credential cache\n (bnc#866130). - supported.conf: remove external from drivers/net/veth\n (bnc#889727) - supported.conf: support net/sched/act_police.ko\n (bnc#890426) - tcp: adapt selected parts of RFC 5682 and PRR logic\n (bnc#879921). - tg3: Change nvram command timeout value to 50ms\n (bnc#855657). - tg3: Override clock, link aware and link idle mode during\n NVRAM dump (bnc#855657). - tg3: Set the MAC clock to the fastest speed\n during boot code load (bnc#855657). - usb: Does not enable LPM if the\n exit latency is zero (bnc#832309). - usbcore: Does not log on consecutive\n debounce failures of the same port (bnc#888105). - usbhid: fix PIXART\n optical mouse (bnc#888607). - uswsusp: Disable when module loading is\n restricted (bnc#884333). - vscsi: support larger transfer sizes\n (bnc#774818). - writeback: Do not sync data dirtied after sync start\n (bnc#833820). - x86 thermal: Delete power-limit-notification console\n messages (bnc#882317). - x86 thermal: Disable power limit notification\n interrupt by default (bnc#882317). - x86 thermal: Re-enable power limit\n notification interrupt by default (bnc#882317). - x86, cpu hotplug: Fix\n stack frame warning in check_irq_vectors_for_cpu_disable() (bnc#887418).\n - x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847). - x86/UV:\n Add kdump to UV NMI handler (bnc#888847). - x86/UV: Add summary of cpu\n activity to UV NMI handler (bnc#888847). - x86/UV: Move NMI support\n (bnc#888847). - x86/UV: Update UV support for external NMI signals\n (bnc#888847). - x86/uv/nmi: Fix Sparse warnings (bnc#888847). - x86: Add\n check for number\n of available vectors before CPU down (bnc#887418). - x86: Lock down IO\n port access when module security is enabled (bnc#884333). - x86: Restrict\n MSR access when module loading is restricted (bnc#884333).\n\n Security Issues:\n\n * CVE-2013-1979\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979</a>>\n * CVE-2014-1739\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739</a>>\n * CVE-2014-2706\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706</a>>\n * CVE-2014-4027\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027</a>>\n * CVE-2014-4171\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171</a>>\n * CVE-2014-4508\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508</a>>\n * CVE-2014-4667\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667</a>>\n * CVE-2014-4943\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943</a>>\n * CVE-2014-5077\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077</a>>\n * CVE-2014-5471\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471</a>>\n * CVE-2014-5472\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472</a>>\n * CVE-2014-3153\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153</a>>\n * CVE-2014-6410\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410</a>>\n", "edition": 1, "modified": "2014-10-23T01:08:35", "published": "2014-10-23T01:08:35", "id": "SUSE-SU-2014:1319-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html", "type": "suse", "title": "Security update for Linux kernel (important)", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:52", "bulletinFamily": "software", "cvelist": ["CVE-2014-2672", "CVE-2014-0100", "CVE-2014-1737", "CVE-2014-1738", "CVE-2014-2851", "CVE-2014-2673", "CVE-2014-2309", "CVE-2014-2678", "CVE-2014-0055", "CVE-2014-0077", "CVE-2014-2523", "CVE-2014-0101", "CVE-2014-2706"], "description": "\r\n\r\n==========================================================================\r\nUbuntu Security Notice USN-2228-1\r\nMay 27, 2014\r\n\r\nlinux vulnerabilities\r\n==========================================================================\r\n\r\nA security issue affects these releases of Ubuntu and its derivatives:\r\n\r\n- Ubuntu 13.10\r\n\r\nSummary:\r\n\r\nSeveral security issues were fixed in the kernel.\r\n\r\nSoftware Description:\r\n- linux: Linux kernel\r\n\r\nDetails:\r\n\r\nMatthew Daley reported an information leak in the floppy disk driver of the\r\nLinux kernel. An unprivileged local user could exploit this flaw to obtain\r\npotentially sensitive information from kernel memory. (CVE-2014-1738)\r\n\r\nMatthew Daley reported a flaw in the handling of ioctl commands by the\r\nfloppy disk driver in the Linux kernel. An unprivileged local user could\r\nexploit this flaw to gain administrative privileges if the floppy disk\r\nmodule is loaded. (CVE-2014-1737)\r\n\r\nA flaw was discovered in the vhost-net subsystem of the Linux kernel. Guest\r\nOS users could exploit this flaw to cause a denial of service (host OS\r\ncrash). (CVE-2014-0055)\r\n\r\nA flaw was discovered in the handling of network packets when mergeable\r\nbuffers are disabled for virtual machines in the Linux kernel. Guest OS\r\nusers may exploit this flaw to cause a denial of service (host OS crash) or\r\npossibly gain privilege on the host OS. (CVE-2014-0077)\r\n\r\nNikolay Aleksandrov discovered a race condition in Linux kernel's IPv4\r\nfragment handling code. Remote attackers could exploit this flaw to cause a\r\ndenial of service (system crash) or possibly have other unspecified impact.\r\n(CVE-2014-0100)\r\n\r\nA flaw was discovered in the Linux kernel's handling of the SCTP handshake.\r\nA remote attacker could exploit this flaw to cause a denial of service\r\n(system crash). (CVE-2014-0101)\r\n\r\nA flaw was discovered in the handling of routing information in Linux\r\nkernel's IPv6 stack. A remote attacker could exploit this flaw to cause a\r\ndenial of service (memory consumption) via a flood of ICMPv6 router\r\nadvertisement packets. (CVE-2014-2309)\r\n\r\nAn error was discovered in the Linux kernel's DCCP protocol support. A\r\nremote attacked could exploit this flaw to cause a denial of service\r\n(system crash) or possibly execute arbitrary code. (CVE-2014-2523)\r\n\r\nMax Sydorenko discovered a race condition in the Atheros 9k wireless driver\r\nin the Linux kernel. This race could be exploited by remote attackers to\r\ncause a denial of service (system crash). (CVE-2014-2672)\r\n\r\nAdhemerval Zanella Neto discovered a flaw the in the Transactional Memory\r\n(TM) implementation for powerpc based machine. An unprivileged local user\r\ncould exploit this flaw to cause a denial of service (system crash).\r\n(CVE-2014-2673)\r\n\r\nAn error was discovered in the Reliable Datagram Sockets (RDS) protocol\r\nstack in the Linux kernel. A local user could exploit this flaw to cause a\r\ndenial of service (system crash) or possibly have unspecified other impact.\r\n(CVE-2014-2678)\r\n\r\nYaara Rozenblum discovered a race condition in the Linux kernel's Generic\r\nIEEE 802.11 Networking Stack (mac80211). Remote attackers could exploit\r\nthis flaw to cause a denial of service (system crash). (CVE-2014-2706)\r\n\r\nA flaw was discovered in the Linux kernel's ping sockets. An unprivileged\r\nlocal user could exploit this flaw to cause a denial of service (system\r\ncrash) or possibly gain privileges via a crafted application.\r\n(CVE-2014-2851)\r\n\r\nUpdate instructions:\r\n\r\nThe problem can be corrected by updating your system to the following\r\npackage versions:\r\n\r\nUbuntu 13.10:\r\n linux-image-3.11.0-22-generic 3.11.0-22.38\r\n linux-image-3.11.0-22-generic-lpae 3.11.0-22.38\r\n\r\nAfter a standard system update you need to reboot your computer to make\r\nall the necessary changes.\r\n\r\nATTENTION: Due to an unavoidable ABI change the kernel updates have\r\nbeen given a new version number, which requires you to recompile and\r\nreinstall all third party kernel modules you might have installed. If\r\nyou use linux-restricted-modules, you have to update that package as\r\nwell to get modules which work with the new kernel version. Unless you\r\nmanually uninstalled the standard kernel metapackages (e.g. linux-generic,\r\nlinux-server, linux-powerpc), a standard system upgrade will automatically\r\nperform this as well.\r\n\r\nReferences:\r\n http://www.ubuntu.com/usn/usn-2228-1\r\n CVE-2014-0055, CVE-2014-0077, CVE-2014-0100, CVE-2014-0101,\r\n CVE-2014-1737, CVE-2014-1738, CVE-2014-2309, CVE-2014-2523,\r\n CVE-2014-2672, CVE-2014-2673, CVE-2014-2678, CVE-2014-2706,\r\n CVE-2014-2851\r\n\r\nPackage Information:\r\n https://launchpad.net/ubuntu/+source/linux/3.11.0-22.38\r\n\r\n\r\n\r\n\r\n-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\r\n\r\n", "edition": 1, "modified": "2014-05-29T00:00:00", "published": "2014-05-29T00:00:00", "id": "SECURITYVULNS:DOC:30757", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:30757", "title": "[USN-2228-1] Linux kernel vulnerabilities", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:55", "bulletinFamily": "software", "cvelist": ["CVE-2014-3122", "CVE-2014-0155", "CVE-2014-2672", "CVE-2012-6647", "CVE-2014-0100", "CVE-2014-1737", "CVE-2014-1738", "CVE-2014-2568", "CVE-2014-3145", "CVE-2014-0196", "CVE-2014-2851", "CVE-2014-2673", "CVE-2014-2309", "CVE-2014-2678", "CVE-2014-3144", "CVE-2014-0049", "CVE-2014-0055", "CVE-2014-2523", "CVE-2014-0101", "CVE-2014-0069", "CVE-2014-2706"], "description": "Memory corruptions in STCP, DCCP and CIFS, KVM and pseudo tty privilege escalations, DoS.", "edition": 1, "modified": "2014-05-29T00:00:00", "published": "2014-05-29T00:00:00", "id": "SECURITYVULNS:VULN:13706", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:13706", "title": "Linux kernel multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}