Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2015:0581-1

Опубликовано: 24 сент. 2014
Источник: suse-cvrf

Описание

Security update for Linux kernel

The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix various bugs and security issues.

The following security bugs have been fixed:

* CVE-2014-1739: The media_device_enum_entities function in drivers/media/media-device.c in the Linux kernel before 3.14.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call (bnc#882804). * CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not properly implement the interaction between range notification and hole punching, which allows local users to cause a denial of service (i_mutex hold) by using the mmap system call to access a hole, as demonstrated by interfering with intended shmem activity by blocking completion of (1) an MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call (bnc#883518). * CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000 (bnc#883724). * CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly manage a certain backlog value, which allows remote attackers to cause a denial of service (socket outage) via a crafted SCTP packet (bnc#885422). * CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket (bnc#887082). * CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction (bnc#889173). * CVE-2014-5471: Stack consumption vulnerability in the parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (uncontrolled recursion, and system crash or reboot) via a crafted iso9660 image with a CL entry referring to a directory entry that has a CL entry. (bnc#892490) * CVE-2014-5472: The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (unkillable mount process) via a crafted iso9660 image with a self-referential CL entry. (bnc#892490) * CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via network traffic that improperly interacts with the WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and tx.c. (bnc#871797) * CVE-2014-4027: The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator. (bnc#882639) * CVE-2014-3153 The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification. (bnc#880892) * CVE-2014-6410: Avoid infinite loop when processing indirect ICBs (bnc#896689)

The following non-security bugs have been fixed:

* ACPI / PAD: call schedule() when need_resched() is true (bnc#866911). * ACPI: Fix bug when ACPI reset register is implemented in system memory (bnc#882900). * ACPI: Limit access to custom_method (bnc#884333). * ALSA: hda - Enabling Realtek ALC 671 codec (bnc#891746). * Add option to automatically enforce module signatures when in Secure Boot mode (bnc#884333). * Add secure_modules() call (bnc#884333). * Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344). * Backported new patches of Lock down functions for UEFI secure boot Also updated series.conf and removed old patches. * Btrfs: Return EXDEV for cross file system snapshot. * Btrfs: abort the transaction when we does not find our extent ref. * Btrfs: avoid warning bomb of btrfs_invalidate_inodes. * Btrfs: cancel scrub on transaction abortion. * Btrfs: correctly set profile flags on seqlock retry. * Btrfs: does not check nodes for extent items. * Btrfs: fix a possible deadlock between scrub and transaction committing. * Btrfs: fix corruption after write/fsync failure + fsync + log recovery (bnc#894200). * Btrfs: fix csum tree corruption, duplicate and outdated checksums (bnc#891619). * Btrfs: fix double free in find_lock_delalloc_range. * Btrfs: fix possible memory leak in btrfs_create_tree(). * Btrfs: fix use of uninit 'ret' in end_extent_writepage(). * Btrfs: free delayed node outside of root->inode_lock (bnc#866864). * Btrfs: make DEV_INFO ioctl available to anyone. * Btrfs: make FS_INFO ioctl available to anyone. * Btrfs: make device scan less noisy. * Btrfs: make sure there are not any read requests before stopping workers. * Btrfs: more efficient io tree navigation on wait_extent_bit. * Btrfs: output warning instead of error when loading free space cache failed. * Btrfs: retrieve more info from FS_INFO ioctl. * Btrfs: return EPERM when deleting a default subvolume (bnc#869934). * Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol (bnc#866615). * Btrfs: use right type to get real comparison. * Btrfs: wake up @scrub_pause_wait as much as we can. * Btrfs: wake up transaction thread upon remount. * CacheFiles: Add missing retrieval completions (bnc#880344). * CacheFiles: Does not try to dump the index key if the cookie has been cleared (bnc#880344). * CacheFiles: Downgrade the requirements passed to the allocator (bnc#880344). * CacheFiles: Fix the marking of cached pages (bnc#880344). * CacheFiles: Implement invalidation (bnc#880344). * CacheFiles: Make some debugging statements conditional (bnc#880344). * Drivers: hv: util: Fix a bug in the KVP code (bnc#886840). * Drivers: hv: vmbus: Fix a bug in the channel callback dispatch code (bnc#886840). * FS-Cache: Add transition to handle invalidate immediately after lookup (bnc#880344). * FS-Cache: Check that there are no read ops when cookie relinquished (bnc#880344). * FS-Cache: Clear remaining page count on retrieval cancellation (bnc#880344). * FS-Cache: Convert the object event ID #defines into an enum (bnc#880344). * FS-Cache: Does not sleep in page release if __GFP_FS is not set (bnc#880344). * FS-Cache: Does not use spin_is_locked() in assertions (bnc#880344). * FS-Cache: Exclusive op submission can BUG if there is been an I/O error (bnc#880344). * FS-Cache: Fix __wait_on_atomic_t() to call the action func if the counter != 0 (bnc#880344). * FS-Cache: Fix object state machine to have separate work and wait states (bnc#880344). * FS-Cache: Fix operation state management and accounting (bnc#880344). * FS-Cache: Fix signal handling during waits (bnc#880344). * FS-Cache: Initialise the object event mask with the calculated mask (bnc#880344). * FS-Cache: Limit the number of I/O error reports for a cache (bnc#880344). * FS-Cache: Make cookie relinquishment wait for outstanding reads (bnc#880344). * FS-Cache: Mark cancellation of in-progress operation (bnc#880344). * FS-Cache: One of the write operation paths doeses not set the object state (bnc#880344). * FS-Cache: Provide proper invalidation (bnc#880344). * FS-Cache: Simplify cookie retention for fscache_objects, fixing oops (bnc#880344). * FS-Cache: The retrieval remaining-pages counter needs to be atomic_t (bnc#880344). * FS-Cache: Uninline fscache_object_init() (bnc#880344). * FS-Cache: Wrap checks on object state (bnc#880344). * HID: usbhid: add always-poll quirk (bnc#888607). * HID: usbhid: enable always-poll quirk for Elan Touchscreen (bnc#888607). * IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297). * Ignore 'flags' change to event_constraint (bnc#876114). * Ignore data_src/weight changes to perf_sample_data (bnc#876114). * NFS: Allow more operations in an NFSv4.1 request (bnc#890513). * NFS: Clean up helper function nfs4_select_rw_stateid() (bnc#888968). * NFS: Does not copy read delegation stateids in setattr (bnc#888968). * NFS: Does not use a delegation to open a file when returning that delegation (bnc#888968, bnc#892200, bnc#893596, bnc#893496) * NFS: Fixes for NFS RCU-walk support in line with code going upstream * NFS: Use FS-Cache invalidation (bnc#880344). * NFS: allow lockless access to access_cache (bnc#866130). * NFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts (bnc#888591). * NFS: nfs4_do_open should add negative results to the dcache (bnc#866130). * NFS: nfs_migrate_page() does not wait for FS-Cache to finish with a page (bnc#880344). * NFS: nfs_open_revalidate: only evaluate parent if it will be used (bnc#866130). * NFS: prepare for RCU-walk support but pushing tests later in code (bnc#866130). * NFS: support RCU_WALK in nfs_permission() (bnc#866130). * NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130). * NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130). * NFSD: Does not hand out delegations for 30 seconds after recalling them (bnc#880370). * NFSv4 set open access operation call flag in nfs4_init_opendata_res (bnc#888968, bnc#892200, bnc#893596, bnc#893496). * NFSv4: Add a helper for encoding opaque data (bnc#888968). * NFSv4: Add a helper for encoding stateids (bnc#888968). * NFSv4: Add helpers for basic copying of stateids (bnc#888968). * NFSv4: Clean up nfs4_select_rw_stateid() (bnc#888968). * NFSv4: Fix the return value of nfs4_select_rw_stateid (bnc#888968). * NFSv4: Rename nfs4_copy_stateid() (bnc#888968). * NFSv4: Resend the READ/WRITE RPC call if a stateid change causes an error (bnc#888968). * NFSv4: Simplify the struct nfs4_stateid (bnc#888968). * NFSv4: The stateid must remain the same for replayed RPC calls (bnc#888968). * NFSv4: nfs4_stateid_is_current should return 'true' for an invalid stateid (bnc#888968). * One more fix for kABI breakage. * PCI: Lock down BAR access when module security is enabled (bnc#884333). * PCI: enable MPS 'performance' setting to properly handle bridge MPS (bnc#883376). * PM / Hibernate: Add memory_rtree_find_bit function (bnc#860441). * PM / Hibernate: Create a Radix-Tree to store memory bitmap (bnc#860441). * PM / Hibernate: Implement position keeping in radix tree (bnc#860441). * PM / Hibernate: Iterate over set bits instead of PFNs in swsusp_free() (bnc#860441). * PM / Hibernate: Remove the old memory-bitmap implementation (bnc#860441). * PM / Hibernate: Touch Soft Lockup Watchdog in rtree_next_node (bnc#860441). * Restrict /dev/mem and /dev/kmem when module loading is restricted (bnc#884333). * Reuse existing 'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT (bnc#876114). * USB: handle LPM errors during device suspend correctly (bnc#849123). * Update kabi files to reflect fscache change (bnc#880344) * Update x86_64 config files: re-enable SENSORS_W83627EHF (bnc#891281) * VFS: Make more complete truncate operation available to CacheFiles (bnc#880344). * [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger (FATE#83366, ltc#83367). * acpi: Ignore acpi_rsdp kernel parameter when module loading is restricted (bnc#884333). * af_iucv: correct cleanup if listen backlog is full (bnc#885262, LTC#111728). * asus-wmi: Restrict debugfs interface when module loading is restricted (bnc#884333). * autofs4: allow RCU-walk to walk through autofs4 (bnc#866130). * autofs4: avoid taking fs_lock during rcu-walk (bnc#866130). * autofs4: does not take spinlock when not needed in autofs4_lookup_expiring (bnc#866130). * autofs4: factor should_expire() out of autofs4_expire_indirect (bnc#866130). * autofs4: make 'autofs4_can_expire' idempotent (bnc#866130). * autofs4: remove a redundant assignment (bnc#866130). * autofs: fix lockref lookup (bnc#888591). * be2net: add dma_mapping_error() check for dma_map_page() (bnc#881759). * block: add cond_resched() to potentially long running ioctl discard loop (bnc#884725). * block: fix race between request completion and timeout handling (bnc#881051). * cdc-ether: clean packet filter upon probe (bnc#876017). * cpuset: Fix memory allocator deadlock (bnc#876590). * crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs have them, but some are FIPS certified, with some kernel support. * crypto: fips - only panic on bad/missing crypto mod signatures (bnc#887503). * crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips mode (bnc#889451). * dasd: validate request size before building CCW/TCW (bnc#891087, LTC#114068). * dm mpath: fix race condition between multipath_dtr and pg_init_done (bnc#826486). * dm-mpath: fix panic on deleting sg device (bnc#870161). * drm/ast: AST2000 cannot be detected correctly (bnc#895983). * drm/ast: Actually load DP501 firmware when required (bnc#895608 bnc#871134). * drm/ast: Add missing entry to dclk_table[]. * drm/ast: Add reduced non reduced mode parsing for wide screen mode (bnc#892723). * drm/ast: initial DP501 support (v0.2) (bnc#871134). * drm/ast: open key before detect chips (bnc#895983). * drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304). * drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064). * drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init (bnc#869055). * drm/i915: create functions for the 'unclaimed register' checks (bnc#869055). * drm/i915: use FPGA_DBG for the 'unclaimed register' checks (bnc#869055). * drm/mgag200: Initialize data needed to map fbdev memory (bnc #806990). * e1000e: enable support for new device IDs (bnc#885509). * fs/fscache: remove spin_lock() from the condition in while() (bnc#880344). * hibernate: Disable in a signed modules environment (bnc#884333). * hugetlb: does not use ERR_PTR with VM_FAULT* values * ibmvscsi: Abort init sequence during error recovery (bnc#885382). * ibmvscsi: Add memory barriers for send / receive (bnc#885382). * inet: add a redirect generation id in inetpeer (bnc#860593). * inetpeer: initialize ->redirect_genid in inet_getpeer() (bnc#860593). * ipv6: tcp: fix tcp_v6_conn_request() (bnc#887645). * kabi: hide bnc#860593 changes of struct inetpeer_addr_base (bnc#860593). * kernel: 3215 tty hang (bnc#891087, LTC#114562). * kernel: fix data corruption when reading /proc/sysinfo (bnc#891087, LTC#114480). * kernel: fix kernel oops with load of fpc register (bnc#889061, LTC#113596). * kernel: sclp console tty reference counting (bnc#891087, LTC#115466). * kexec: Disable at runtime if the kernel enforces module loading restrictions (bnc#884333). * md/raid6: avoid data corruption during recovery of double-degraded RAID6. * memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim fix). * memcg: do not expose uninitialized mem_cgroup_per_node to world (bnc#883096). * mm, hugetlb: add VM_NORESERVE check in vma_has_reserves() * mm, hugetlb: change variable name reservations to resv * mm, hugetlb: decrement reserve count if VM_NORESERVE alloc page cache * mm, hugetlb: defer freeing pages when gathering surplus pages * mm, hugetlb: do not use a page in page cache for cow optimization * mm, hugetlb: fix and clean-up node iteration code to alloc or free * mm, hugetlb: fix race in region tracking * mm, hugetlb: fix subpool accounting handling * mm, hugetlb: improve page-fault scalability * mm, hugetlb: improve, cleanup resv_map parameters * mm, hugetlb: move up the code which check availability of free huge page * mm, hugetlb: protect reserved pages when soft offlining a hugepage * mm, hugetlb: remove decrement_hugepage_resv_vma() * mm, hugetlb: remove redundant list_empty check in gather_surplus_pages() * mm, hugetlb: remove resv_map_put * mm, hugetlb: remove useless check about mapping type * mm, hugetlb: return a reserved page to a reserved pool if failed * mm, hugetlb: trivial commenting fix * mm, hugetlb: unify region structure handling * mm, hugetlb: unify region structure handling kabi * mm, hugetlb: use long vars instead of int in region_count() (Hugetlb Fault Scalability). * mm, hugetlb: use vma_resv_map() map types * mm, oom: fix badness score underflow (bnc#884582, bnc#884767). * mm, oom: normalize oom scores to oom_score_adj scale only for userspace (bnc#884582, bnc#884767). * mm, thp: do not allow thp faults to avoid cpuset restrictions (bnc#888849). * net/mlx4_core: Load higher level modules according to ports type (bnc#887680). * net/mlx4_core: Load the IB driver when the device supports IBoE (bnc#887680). * net/mlx4_en: Fix a race between napi poll function and RX ring cleanup (bnc#863586). * net/mlx4_en: Fix selftest failing on non 10G link speed (bnc#888058). * net: fix checksumming features handling in output path (bnc#891259). * pagecache_limit: batch large nr_to_scan targets (bnc#895221). * pagecachelimit: reduce lru_lock congestion for heavy parallel reclaim fix (bnc#895680). * perf/core: Add weighted samples (bnc#876114). * perf/x86: Add flags to event constraints (bnc#876114). * perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114). * perf: Add generic memory sampling interface (bnc#876114). * qla2xxx: Avoid escalating the SCSI error handler if the command is not found in firmware (bnc#859840). * qla2xxx: Clear loop_id for ports that are marked lost during fabric scanning (bnc#859840). * qla2xxx: Does not check for firmware hung during the reset context for ISP82XX (bnc#859840). * qla2xxx: Issue abort command for outstanding commands during cleanup when only firmware is alive (bnc#859840). * qla2xxx: Reduce the time we wait for a command to complete during SCSI error handling (bnc#859840). * qla2xxx: Set host can_queue value based on available resources (bnc#859840). * restore smp_mb() in unlock_new_inode() (bnc#890526). * s390/pci: introduce lazy IOTLB flushing for DMA unmap (bnc#889061, LTC#113725). * sched: fix the theoretical signal_wake_up() vs schedule() race (bnc#876055). * sclp_vt220: Enable integrated ASCII console per default (bnc#885262, LTC#112035). * scsi_dh: use missing accessor 'scsi_device_from_queue' (bnc#889614). * scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608). * scsiback: correct grant page unmapping. * scsiback: fix retry handling in __report_luns(). * scsiback: free resources after error. * sunrpc/auth: allow lockless (rcu) lookup of credential cache (bnc#866130). * supported.conf: remove external from drivers/net/veth (bnc#889727) * supported.conf: support net/sched/act_police.ko (bnc#890426) * tcp: adapt selected parts of RFC 5682 and PRR logic (bnc#879921). * tg3: Change nvram command timeout value to 50ms (bnc#855657). * tg3: Override clock, link aware and link idle mode during NVRAM dump (bnc#855657). * tg3: Set the MAC clock to the fastest speed during boot code load (bnc#855657). * usb: Does not enable LPM if the exit latency is zero (bnc#832309). * usbcore: Does not log on consecutive debounce failures of the same port (bnc#888105). * usbhid: fix PIXART optical mouse (bnc#888607). * uswsusp: Disable when module loading is restricted (bnc#884333). * vscsi: support larger transfer sizes (bnc#774818). * writeback: Do not sync data dirtied after sync start (bnc#833820). * x86 thermal: Delete power-limit-notification console messages (bnc#882317). * x86 thermal: Disable power limit notification interrupt by default (bnc#882317). * x86 thermal: Re-enable power limit notification interrupt by default (bnc#882317). * x86, cpu hotplug: Fix stack frame warning in check_irq_vectors_for_cpu_disable() (bnc#887418). * x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847). * x86/UV: Add kdump to UV NMI handler (bnc#888847). * x86/UV: Add summary of cpu activity to UV NMI handler (bnc#888847). * x86/UV: Move NMI support (bnc#888847). * x86/UV: Update UV support for external NMI signals (bnc#888847). * x86/uv/nmi: Fix Sparse warnings (bnc#888847). * x86: Add check for number of available vectors before CPU down (bnc#887418). * x86: Lock down IO port access when module security is enabled (bnc#884333). * x86: Restrict MSR access when module loading is restricted (bnc#884333).

Security Issues:

* CVE-2013-1979 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979> * CVE-2014-1739 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739> * CVE-2014-2706 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706> * CVE-2014-4027 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027> * CVE-2014-4171 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171> * CVE-2014-4508 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508> * CVE-2014-4667 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667> * CVE-2014-4943 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943> * CVE-2014-5077 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077> * CVE-2014-5471 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471> * CVE-2014-5472 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472> * CVE-2014-3153 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153> * CVE-2014-6410 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410>

The SUSE Linux Enterprise 11 Service Pack 3 kernel was updated to fix various bugs and security issues.

Following security bugs were fixed: CVE-2013-1979: The scm_set_cred function in include/net/scm.h in the Linux kernel before 3.8.11 uses incorrect uid and gid values during credentials passing, which allows local users to gain privileges via a crafted application (bnc#816708).

CVE-2014-1739: The media_device_enum_entities function in drivers/media/media-device.c in the Linux kernel before 3.14.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call (bnc#882804).

CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not properly implement the interaction between range notification and hole punching, which allows local users to cause a denial of service (i_mutex hold) by using the mmap system call to access a hole, as demonstrated by interfering with intended shmem activity by blocking completion of (1) an MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call (bnc#883518).

CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000 (bnc#883724).

CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly manage a certain backlog value, which allows remote attackers to cause a denial of service (socket outage) via a crafted SCTP packet (bnc#885422).

CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket (bnc#887082).

CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction (bnc#889173).

CVE-2014-5471: Stack consumption vulnerability in the parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (uncontrolled recursion, and system crash or reboot) via a crafted iso9660 image with a CL entry referring to a directory entry that has a CL entry. (bnc#892490)

CVE-2014-5472: The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (unkillable mount process) via a crafted iso9660 image with a self-referential CL entry. (bnc#892490)

CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via network traffic that improperly interacts with the WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and tx.c. (bnc#871797)

CVE-2014-4027: The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator. (bnc#882639)

CVE-2014-3153 The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification. (bnc#880892)

CVE-2014-6410: Avoid infinite loop when processing indirect ICBs (bnc#896689)

The following non-security bugs were fixed: - ACPI / PAD: call schedule() when need_resched() is true (bnc#866911). - ACPI: Fix bug when ACPI reset register is implemented in system memory (bnc#882900). - ACPI: Limit access to custom_method (bnc#884333). - ALSA: hda - Enabling Realtek ALC 671 codec (bnc#891746). - Add option to automatically enforce module signatures when in Secure Boot mode (bnc#884333). - Add secure_modules() call (bnc#884333).

  • Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344). - Backported new patches of Lock down functions for UEFI secure boot Also updated series.conf and removed old patches. - Btrfs: Return EXDEV for cross file system snapshot. - Btrfs: abort the transaction when we does not find our extent ref. - Btrfs: avoid warning bomb of btrfs_invalidate_inodes. - Btrfs: cancel scrub on transaction abortion. - Btrfs: correctly set profile flags on seqlock retry. - Btrfs: does not check nodes for extent items. - Btrfs: fix a possible deadlock between scrub and transaction committing. - Btrfs: fix corruption after write/fsync failure + fsync + log recovery (bnc#894200). - Btrfs: fix csum tree corruption, duplicate and outdated checksums (bnc#891619). - Btrfs: fix double free in find_lock_delalloc_range. - Btrfs: fix possible memory leak in btrfs_create_tree(). - Btrfs: fix use of uninit 'ret' in end_extent_writepage(). - Btrfs: free delayed node outside of root->inode_lock (bnc#866864). - Btrfs: make DEV_INFO ioctl available to anyone. - Btrfs: make FS_INFO ioctl available to anyone. - Btrfs: make device scan less noisy. - Btrfs: make sure there are not any read requests before stopping workers. - Btrfs: more efficient io tree navigation on wait_extent_bit. - Btrfs: output warning instead of error when loading free space cache failed. - Btrfs: retrieve more info from FS_INFO ioctl. - Btrfs: return EPERM when deleting a default subvolume (bnc#869934). - Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol (bnc#866615).
  • Btrfs: use right type to get real comparison. - Btrfs: wake up @scrub_pause_wait as much as we can. - Btrfs: wake up transaction thread upon remount. - CacheFiles: Add missing retrieval completions (bnc#880344).
  • CacheFiles: Does not try to dump the index key if the cookie has been cleared (bnc#880344). - CacheFiles: Downgrade the requirements passed to the allocator (bnc#880344). - CacheFiles: Fix the marking of cached pages (bnc#880344). - CacheFiles: Implement invalidation (bnc#880344). - CacheFiles: Make some debugging statements conditional (bnc#880344). - Drivers: hv: util: Fix a bug in the KVP code (bnc#886840). - Drivers: hv: vmbus: Fix a bug in the channel callback dispatch code (bnc#886840). - FS-Cache: Add transition to handle invalidate immediately after lookup (bnc#880344). - FS-Cache: Check that there are no read ops when cookie relinquished (bnc#880344). - FS-Cache: Clear remaining page count on retrieval cancellation (bnc#880344). - FS-Cache: Convert the object event ID #defines into an enum (bnc#880344). - FS-Cache: Does not sleep in page release if __GFP_FS is not set (bnc#880344). - FS-Cache: Does not use spin_is_locked() in assertions (bnc#880344). - FS-Cache: Exclusive op submission can BUG if there is been an I/O error (bnc#880344). - FS-Cache: Fix __wait_on_atomic_t() to call the action func if the counter != 0 (bnc#880344). - FS-Cache: Fix object state machine to have separate work and wait states (bnc#880344). - FS-Cache: Fix operation state management and accounting (bnc#880344). - FS-Cache: Fix signal handling during waits (bnc#880344). - FS-Cache: Initialise the object event mask with the calculated mask (bnc#880344). - FS-Cache: Limit the number of I/O error reports for a cache (bnc#880344). - FS-Cache: Make cookie relinquishment wait for outstanding reads (bnc#880344). - FS-Cache: Mark cancellation of in-progress operation (bnc#880344). - FS-Cache: One of the write operation paths doeses not set the object state (bnc#880344). - FS-Cache: Provide proper invalidation (bnc#880344). - FS-Cache: Simplify cookie retention for fscache_objects, fixing oops (bnc#880344). - FS-Cache: The retrieval remaining-pages counter needs to be atomic_t (bnc#880344). - FS-Cache: Uninline fscache_object_init() (bnc#880344). - FS-Cache: Wrap checks on object state (bnc#880344). - HID: usbhid: add always-poll quirk (bnc#888607). - HID: usbhid: enable always-poll quirk for Elan Touchscreen (bnc#888607). - IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297). - Ignore 'flags' change to event_constraint (bnc#876114). - Ignore data_src/weight changes to perf_sample_data (bnc#876114). - NFS: Allow more operations in an NFSv4.1 request (bnc#890513). - NFS: Clean up helper function nfs4_select_rw_stateid() (bnc#888968). - NFS: Does not copy read delegation stateids in setattr (bnc#888968). - NFS: Does not use a delegation to open a file when returning that delegation (bnc#888968, bnc#892200, bnc#893596, bnc#893496) - NFS: Fixes for NFS RCU-walk support in line with code going upstream - NFS: Use FS-Cache invalidation (bnc#880344). - NFS: allow lockless access to access_cache (bnc#866130). - NFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts (bnc#888591). - NFS: nfs4_do_open should add negative results to the dcache (bnc#866130). - NFS: nfs_migrate_page() does not wait for FS-Cache to finish with a page (bnc#880344). - NFS: nfs_open_revalidate: only evaluate parent if it will be used (bnc#866130). - NFS: prepare for RCU-walk support but pushing tests later in code (bnc#866130). - NFS: support RCU_WALK in nfs_permission() (bnc#866130). - NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130). - NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130). - NFSD: Does not hand out delegations for 30 seconds after recalling them (bnc#880370). - NFSv4 set open access operation call flag in nfs4_init_opendata_res (bnc#888968, bnc#892200, bnc#893596, bnc#893496). - NFSv4: Add a helper for encoding opaque data (bnc#888968). - NFSv4: Add a helper for encoding stateids (bnc#888968). - NFSv4: Add helpers for basic copying of stateids (bnc#888968). - NFSv4: Clean up nfs4_select_rw_stateid() (bnc#888968). - NFSv4: Fix the return value of nfs4_select_rw_stateid (bnc#888968). - NFSv4: Rename nfs4_copy_stateid() (bnc#888968). - NFSv4: Resend the READ/WRITE RPC call if a stateid change causes an error (bnc#888968). - NFSv4: Simplify the struct nfs4_stateid (bnc#888968). - NFSv4: The stateid must remain the same for replayed RPC calls (bnc#888968). - NFSv4: nfs4_stateid_is_current should return 'true' for an invalid stateid (bnc#888968). - One more fix for kABI breakage. - PCI: Lock down BAR access when module security is enabled (bnc#884333). - PCI: enable MPS 'performance' setting to properly handle bridge MPS (bnc#883376). - PM / Hibernate: Add memory_rtree_find_bit function (bnc#860441). - PM / Hibernate: Create a Radix-Tree to store memory bitmap (bnc#860441). - PM / Hibernate: Implement position keeping in radix tree (bnc#860441). - PM / Hibernate: Iterate over set bits instead of PFNs in swsusp_free() (bnc#860441). - PM / Hibernate: Remove the old memory-bitmap implementation (bnc#860441). - PM / Hibernate: Touch Soft Lockup Watchdog in rtree_next_node (bnc#860441). - Restrict /dev/mem and /dev/kmem when module loading is restricted (bnc#884333). - Reuse existing 'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT (bnc#876114). - USB: handle LPM errors during device suspend correctly (bnc#849123). - Update kabi files to reflect fscache change (bnc#880344) - Update x86_64 config files: re-enable SENSORS_W83627EHF (bnc#891281) - VFS: Make more complete truncate operation available to CacheFiles (bnc#880344). - [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger (FATE#83366, ltc#83367). - acpi: Ignore acpi_rsdp kernel parameter when module loading is restricted (bnc#884333). - af_iucv: correct cleanup if listen backlog is full (bnc#885262, LTC#111728). - asus-wmi: Restrict debugfs interface when module loading is restricted (bnc#884333). - autofs4: allow RCU-walk to walk through autofs4 (bnc#866130). - autofs4: avoid taking fs_lock during rcu-walk (bnc#866130). - autofs4: does not take spinlock when not needed in autofs4_lookup_expiring (bnc#866130). - autofs4: factor should_expire() out of autofs4_expire_indirect (bnc#866130). - autofs4: make 'autofs4_can_expire' idempotent (bnc#866130). - autofs4: remove a redundant assignment (bnc#866130). - autofs: fix lockref lookup (bnc#888591). - be2net: add dma_mapping_error() check for dma_map_page() (bnc#881759). - block: add cond_resched() to potentially long running ioctl discard loop (bnc#884725). - block: fix race between request completion and timeout handling (bnc#881051). - cdc-ether: clean packet filter upon probe (bnc#876017). - cpuset: Fix memory allocator deadlock (bnc#876590). - crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs have them, but some are FIPS certified, with some kernel support. - crypto: fips
  • only panic on bad/missing crypto mod signatures (bnc#887503). - crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips mode (bnc#889451). - dasd: validate request size before building CCW/TCW (bnc#891087, LTC#114068). - dm mpath: fix race condition between multipath_dtr and pg_init_done (bnc#826486). - dm-mpath: fix panic on deleting sg device (bnc#870161). - drm/ast: AST2000 cannot be detected correctly (bnc#895983). - drm/ast: Actually load DP501 firmware when required (bnc#895608 bnc#871134). - drm/ast: Add missing entry to dclk_table[]. - drm/ast: Add reduced non reduced mode parsing for wide screen mode (bnc#892723). - drm/ast: initial DP501 support (v0.2) (bnc#871134). - drm/ast: open key before detect chips (bnc#895983). - drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304). - drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064). - drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init (bnc#869055). - drm/i915: create functions for the 'unclaimed register' checks (bnc#869055). - drm/i915: use FPGA_DBG for the 'unclaimed register' checks (bnc#869055). - drm/mgag200: Initialize data needed to map fbdev memory (bnc #806990). - e1000e: enable support for new device IDs (bnc#885509). - fs/fscache: remove spin_lock() from the condition in while() (bnc#880344).
  • hibernate: Disable in a signed modules environment (bnc#884333). - hugetlb: does not use ERR_PTR with VM_FAULT* values - ibmvscsi: Abort init sequence during error recovery (bnc#885382). - ibmvscsi: Add memory barriers for send / receive (bnc#885382). - inet: add a redirect generation id in inetpeer (bnc#860593). - inetpeer: initialize ->redirect_genid in inet_getpeer() (bnc#860593). - ipv6: tcp: fix tcp_v6_conn_request() (bnc#887645). - kabi: hide bnc#860593 changes of struct inetpeer_addr_base (bnc#860593). - kernel: 3215 tty hang (bnc#891087, LTC#114562). - kernel: fix data corruption when reading /proc/sysinfo (bnc#891087, LTC#114480). - kernel: fix kernel oops with load of fpc register (bnc#889061, LTC#113596).
  • kernel: sclp console tty reference counting (bnc#891087, LTC#115466). - kexec: Disable at runtime if the kernel enforces module loading restrictions (bnc#884333). - md/raid6: avoid data corruption during recovery of double-degraded RAID6. - memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim fix). - memcg: do not expose uninitialized mem_cgroup_per_node to world (bnc#883096). - mm, hugetlb: add VM_NORESERVE check in vma_has_reserves() - mm, hugetlb: change variable name reservations to resv - mm, hugetlb: decrement reserve count if VM_NORESERVE alloc page cache - mm, hugetlb: defer freeing pages when gathering surplus pages - mm, hugetlb: do not use a page in page cache for cow optimization - mm, hugetlb: fix and clean-up node iteration code to alloc or free - mm, hugetlb: fix race in region tracking - mm, hugetlb: fix subpool accounting handling - mm, hugetlb: improve page-fault scalability - mm, hugetlb: improve, cleanup resv_map parameters - mm, hugetlb: move up the code which check availability of free huge page - mm, hugetlb: protect reserved pages when soft offlining a hugepage - mm, hugetlb: remove decrement_hugepage_resv_vma() - mm, hugetlb: remove redundant list_empty check in gather_surplus_pages() - mm, hugetlb: remove resv_map_put - mm, hugetlb: remove useless check about mapping type - mm, hugetlb: return a reserved page to a reserved pool if failed - mm, hugetlb: trivial commenting fix - mm, hugetlb: unify region structure handling - mm, hugetlb: unify region structure handling kabi - mm, hugetlb: use long vars instead of int in region_count() (Hugetlb Fault Scalability). - mm, hugetlb: use vma_resv_map() map types - mm, oom: fix badness score underflow (bnc#884582, bnc#884767). - mm, oom: normalize oom scores to oom_score_adj scale only for userspace (bnc#884582, bnc#884767). - mm, thp: do not allow thp faults to avoid cpuset restrictions (bnc#888849). - net/mlx4_core: Load higher level modules according to ports type (bnc#887680). - net/mlx4_core: Load the IB driver when the device supports IBoE (bnc#887680). - net/mlx4_en: Fix a race between napi poll function and RX ring cleanup (bnc#863586). - net/mlx4_en: Fix selftest failing on non 10G link speed (bnc#888058). - net: fix checksumming features handling in output path (bnc#891259). - pagecache_limit: batch large nr_to_scan targets (bnc#895221). - pagecachelimit: reduce lru_lock congestion for heavy parallel reclaim fix (bnc#895680). - perf/core: Add weighted samples (bnc#876114). - perf/x86: Add flags to event constraints (bnc#876114). - perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114). - perf: Add generic memory sampling interface (bnc#876114). - qla2xxx: Avoid escalating the SCSI error handler if the command is not found in firmware (bnc#859840). - qla2xxx: Clear loop_id for ports that are marked lost during fabric scanning (bnc#859840). - qla2xxx: Does not check for firmware hung during the reset context for ISP82XX (bnc#859840). - qla2xxx: Issue abort command for outstanding commands during cleanup when only firmware is alive (bnc#859840). - qla2xxx: Reduce the time we wait for a command to complete during SCSI error handling (bnc#859840). - qla2xxx: Set host can_queue value based on available resources (bnc#859840). - restore smp_mb() in unlock_new_inode() (bnc#890526). - s390/pci: introduce lazy IOTLB flushing for DMA unmap (bnc#889061, LTC#113725). - sched: fix the theoretical signal_wake_up() vs schedule() race (bnc#876055). - sclp_vt220: Enable integrated ASCII console per default (bnc#885262, LTC#112035). - scsi_dh: use missing accessor 'scsi_device_from_queue' (bnc#889614). - scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608). - scsiback: correct grant page unmapping. - scsiback: fix retry handling in __report_luns(). - scsiback: free resources after error. - sunrpc/auth: allow lockless (rcu) lookup of credential cache (bnc#866130). - supported.conf: remove external from drivers/net/veth (bnc#889727) - supported.conf: support net/sched/act_police.ko (bnc#890426) - tcp: adapt selected parts of RFC 5682 and PRR logic (bnc#879921). - tg3: Change nvram command timeout value to 50ms (bnc#855657). - tg3: Override clock, link aware and link idle mode during NVRAM dump (bnc#855657). - tg3: Set the MAC clock to the fastest speed during boot code load (bnc#855657). - usb: Does not enable LPM if the exit latency is zero (bnc#832309). - usbcore: Does not log on consecutive debounce failures of the same port (bnc#888105). - usbhid: fix PIXART optical mouse (bnc#888607). - uswsusp: Disable when module loading is restricted (bnc#884333). - vscsi: support larger transfer sizes (bnc#774818). - writeback: Do not sync data dirtied after sync start (bnc#833820). - x86 thermal: Delete power-limit-notification console messages (bnc#882317). - x86 thermal: Disable power limit notification interrupt by default (bnc#882317). - x86 thermal: Re-enable power limit notification interrupt by default (bnc#882317). - x86, cpu hotplug: Fix stack frame warning in check_irq_vectors_for_cpu_disable() (bnc#887418). - x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847). - x86/UV: Add kdump to UV NMI handler (bnc#888847). - x86/UV: Add summary of cpu activity to UV NMI handler (bnc#888847). - x86/UV: Move NMI support (bnc#888847). - x86/UV: Update UV support for external NMI signals (bnc#888847). - x86/uv/nmi: Fix Sparse warnings (bnc#888847). - x86: Add check for number of available vectors before CPU down (bnc#887418). - x86: Lock down IO port access when module security is enabled (bnc#884333). - x86: Restrict MSR access when module loading is restricted (bnc#884333).

Security Issues:

* CVE-2013-1979 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979> * CVE-2014-1739 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739> * CVE-2014-2706 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706> * CVE-2014-4027 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027> * CVE-2014-4171 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171> * CVE-2014-4508 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508> * CVE-2014-4667 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667> * CVE-2014-4943 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943> * CVE-2014-5077 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077> * CVE-2014-5471 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471> * CVE-2014-5472 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472> * CVE-2014-3153 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153> * CVE-2014-6410 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410>

Список пакетов

SUSE Linux Enterprise Desktop 11 SP3
kernel-bigsmp-devel-3.0.101-0.47.55.1
kernel-default-3.0.101-0.40.1
kernel-default-base-3.0.101-0.40.1
kernel-default-devel-3.0.101-0.40.1
kernel-default-extra-3.0.101-0.40.1
kernel-pae-3.0.101-0.40.1
kernel-pae-base-3.0.101-0.40.1
kernel-pae-devel-3.0.101-0.40.1
kernel-pae-extra-3.0.101-0.40.1
kernel-source-3.0.101-0.40.1
kernel-syms-3.0.101-0.40.1
kernel-trace-devel-3.0.101-0.40.1
kernel-xen-3.0.101-0.40.1
kernel-xen-base-3.0.101-0.40.1
kernel-xen-devel-3.0.101-0.40.1
kernel-xen-extra-3.0.101-0.40.1
xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7.3
xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3
SUSE Linux Enterprise High Availability Extension 11 SP3
cluster-network-kmp-bigsmp-1.4_3.0.101_0.47.55-2.28.1.21
cluster-network-kmp-default-1.4_3.0.101_0.40-2.27.98
cluster-network-kmp-pae-1.4_3.0.101_0.40-2.27.98
cluster-network-kmp-ppc64-1.4_3.0.101_0.40-2.27.98
cluster-network-kmp-trace-1.4_3.0.101_0.40-2.27.98
cluster-network-kmp-xen-1.4_3.0.101_0.40-2.27.98
gfs2-kmp-bigsmp-2_3.0.101_0.47.55-0.17.1.21
gfs2-kmp-default-2_3.0.101_0.40-0.16.104
gfs2-kmp-pae-2_3.0.101_0.40-0.16.104
gfs2-kmp-ppc64-2_3.0.101_0.40-0.16.104
gfs2-kmp-trace-2_3.0.101_0.40-0.16.104
gfs2-kmp-xen-2_3.0.101_0.40-0.16.104
ocfs2-kmp-bigsmp-1.6_3.0.101_0.47.55-0.21.1.21
ocfs2-kmp-default-1.6_3.0.101_0.40-0.20.98
ocfs2-kmp-pae-1.6_3.0.101_0.40-0.20.98
ocfs2-kmp-ppc64-1.6_3.0.101_0.40-0.20.98
ocfs2-kmp-trace-1.6_3.0.101_0.40-0.20.98
ocfs2-kmp-xen-1.6_3.0.101_0.40-0.20.98
SUSE Linux Enterprise Server 11 SP3
kernel-bigsmp-3.0.101-0.47.55.1
kernel-bigsmp-base-3.0.101-0.47.55.1
kernel-bigsmp-devel-3.0.101-0.47.55.1
kernel-default-3.0.101-0.40.1
kernel-default-base-3.0.101-0.40.1
kernel-default-devel-3.0.101-0.40.1
kernel-default-man-3.0.101-0.40.1
kernel-ec2-3.0.101-0.40.1
kernel-ec2-base-3.0.101-0.40.1
kernel-ec2-devel-3.0.101-0.40.1
kernel-pae-3.0.101-0.40.1
kernel-pae-base-3.0.101-0.40.1
kernel-pae-devel-3.0.101-0.40.1
kernel-ppc64-3.0.101-0.40.1
kernel-ppc64-base-3.0.101-0.40.1
kernel-ppc64-devel-3.0.101-0.40.1
kernel-source-3.0.101-0.40.1
kernel-syms-3.0.101-0.40.1
kernel-trace-3.0.101-0.40.1
kernel-trace-base-3.0.101-0.40.1
kernel-trace-devel-3.0.101-0.40.1
kernel-xen-3.0.101-0.40.1
kernel-xen-base-3.0.101-0.40.1
kernel-xen-devel-3.0.101-0.40.1
xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7.3
xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3
SUSE Linux Enterprise Server 11 SP3-TERADATA
kernel-bigsmp-3.0.101-0.47.55.1
kernel-bigsmp-base-3.0.101-0.47.55.1
kernel-bigsmp-devel-3.0.101-0.47.55.1
kernel-default-3.0.101-0.40.1
kernel-default-base-3.0.101-0.40.1
kernel-default-devel-3.0.101-0.40.1
kernel-default-man-3.0.101-0.40.1
kernel-ec2-3.0.101-0.40.1
kernel-ec2-base-3.0.101-0.40.1
kernel-ec2-devel-3.0.101-0.40.1
kernel-pae-3.0.101-0.40.1
kernel-pae-base-3.0.101-0.40.1
kernel-pae-devel-3.0.101-0.40.1
kernel-ppc64-3.0.101-0.40.1
kernel-ppc64-base-3.0.101-0.40.1
kernel-ppc64-devel-3.0.101-0.40.1
kernel-source-3.0.101-0.40.1
kernel-syms-3.0.101-0.40.1
kernel-trace-3.0.101-0.40.1
kernel-trace-base-3.0.101-0.40.1
kernel-trace-devel-3.0.101-0.40.1
kernel-xen-3.0.101-0.40.1
kernel-xen-base-3.0.101-0.40.1
kernel-xen-devel-3.0.101-0.40.1
xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7.3
xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3
SUSE Linux Enterprise Server for SAP Applications 11 SP3
kernel-bigsmp-3.0.101-0.47.55.1
kernel-bigsmp-base-3.0.101-0.47.55.1
kernel-bigsmp-devel-3.0.101-0.47.55.1
kernel-default-3.0.101-0.40.1
kernel-default-base-3.0.101-0.40.1
kernel-default-devel-3.0.101-0.40.1
kernel-default-man-3.0.101-0.40.1
kernel-ec2-3.0.101-0.40.1
kernel-ec2-base-3.0.101-0.40.1
kernel-ec2-devel-3.0.101-0.40.1
kernel-pae-3.0.101-0.40.1
kernel-pae-base-3.0.101-0.40.1
kernel-pae-devel-3.0.101-0.40.1
kernel-ppc64-3.0.101-0.40.1
kernel-ppc64-base-3.0.101-0.40.1
kernel-ppc64-devel-3.0.101-0.40.1
kernel-source-3.0.101-0.40.1
kernel-syms-3.0.101-0.40.1
kernel-trace-3.0.101-0.40.1
kernel-trace-base-3.0.101-0.40.1
kernel-trace-devel-3.0.101-0.40.1
kernel-xen-3.0.101-0.40.1
kernel-xen-base-3.0.101-0.40.1
kernel-xen-devel-3.0.101-0.40.1
xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7.3
xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3

Описание

The rds_ib_xmit function in net/rds/ib_send.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and earlier allows local users to cause a denial of service (BUG_ON and kernel panic) by establishing an RDS connection with the source IP address equal to the IPoIB interface's own IP address, as demonstrated by rds-ping.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The __request_module function in kernel/kmod.c in the Linux kernel before 3.4 does not set a certain killable attribute, which allows local users to cause a denial of service (memory consumption) via a crafted application.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The Linux kernel through 3.7.9 allows local users to obtain sensitive information about keystroke timing by using the inotify API on the /dev/ptmx device.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

net/ceph/auth_none.c in the Linux kernel through 3.10 allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via an auth_reply message that triggers an attempted build_request operation.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The chase_port function in drivers/usb/serial/io_ti.c in the Linux kernel before 3.7.4 allows local users to cause a denial of service (NULL pointer dereference and system crash) via an attempted /dev/ttyUSB read or write operation on a disconnected Edgeport USB serial converter.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The _xfs_buf_find function in fs/xfs/xfs_buf.c in the Linux kernel before 3.7.6 does not validate block numbers, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging the ability to mount an XFS filesystem containing a metadata inode with an invalid extent map.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

Heap-based buffer overflow in the tg3_read_vpd function in drivers/net/ethernet/broadcom/tg3.c in the Linux kernel before 3.8.6 allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via crafted firmware that specifies a long string in the Vital Product Data (VPD) data structure.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The scm_set_cred function in include/net/scm.h in the Linux kernel before 3.8.11 uses incorrect uid and gid values during credentials passing, which allows local users to gain privileges via a crafted application.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

arch/x86/kernel/cpu/perf_event_intel.c in the Linux kernel before 3.8.9, when the Performance Events Subsystem is enabled, specifies an incorrect bitmask, which allows local users to cause a denial of service (general protection fault and system crash) by attempting to set a reserved bit.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The fill_event_metadata function in fs/notify/fanotify/fanotify_user.c in the Linux kernel through 3.9.4 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a read operation on the fanotify descriptor.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The mmc_ioctl_cdrom_read_data function in drivers/cdrom/cdrom.c in the Linux kernel through 3.10 allows local users to obtain sensitive information from kernel memory via a read operation on a malfunctioning CD-ROM drive.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The sctp_sf_do_5_2_4_dupcook function in net/sctp/sm_statefuns.c in the SCTP implementation in the Linux kernel before 3.8.5 does not properly handle associations during the processing of a duplicate COOKIE ECHO chunk, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via crafted SCTP traffic.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The ip6_sk_dst_check function in net/ipv6/ip6_output.c in the Linux kernel before 3.10 allows local users to cause a denial of service (system crash) by using an AF_INET6 socket for a connection to an IPv4 interface.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The (1) key_notify_sa_flush and (2) key_notify_policy_flush functions in net/key/af_key.c in the Linux kernel before 3.10 do not initialize certain structure members, which allows local users to obtain sensitive information from kernel heap memory by reading a broadcast message from the notify interface of an IPSec key_socket.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The key_notify_policy_flush function in net/key/af_key.c in the Linux kernel before 3.9 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory by reading a broadcast message from the notify_policy interface of an IPSec key_socket.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

Format string vulnerability in the register_disk function in block/genhd.c in the Linux kernel through 3.9.4 allows local users to gain privileges by leveraging root access and writing format string specifiers to /sys/module/md_mod/parameters/new_array in order to create a crafted /dev/md device name.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

Format string vulnerability in the b43_request_firmware function in drivers/net/wireless/b43/main.c in the Broadcom B43 wireless driver in the Linux kernel through 3.9.4 allows local users to gain privileges by leveraging root access and including format string specifiers in an fwpostfix modprobe parameter, leading to improper construction of an error message.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

drivers/hid/hid-zpff.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_ZEROPLUS is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_LOGITECH_FF, CONFIG_LOGIG940_FF, or CONFIG_LOGIWHEELS_FF is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device, related to (1) drivers/hid/hid-lgff.c, (2) drivers/hid/hid-lg3ff.c, and (3) drivers/hid/hid-lg4ff.c.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

Multiple array index errors in drivers/hid/hid-multitouch.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_MULTITOUCH is enabled, allow physically proximate attackers to cause a denial of service (heap memory corruption, or NULL pointer dereference and OOPS) via a crafted device.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

drivers/hid/hid-picolcd_core.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_PICOLCD is enabled, allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) via a crafted device.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The Linux kernel before 3.12.2 does not properly use the get_dumpable function, which allows local users to bypass intended ptrace restrictions or obtain sensitive information from IA64 scratch registers via a crafted application, related to kernel/ptrace.c and arch/ia64/include/asm/processor.h.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The perf_trace_event_perm function in kernel/trace/trace_event_perf.c in the Linux kernel before 3.12.2 does not properly restrict access to the perf subsystem, which allows local users to enable function tracing via a crafted application.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The crypto API in the Linux kernel through 3.9-rc8 does not initialize certain length variables, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call, related to the hash_recvmsg function in crypto/algif_hash.c and the skcipher_recvmsg function in crypto/algif_skcipher.c.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The vcc_recvmsg function in net/atm/common.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The ax25_recvmsg function in net/ax25/af_ax25.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The bt_sock_recvmsg function in net/bluetooth/af_bluetooth.c in the Linux kernel before 3.9-rc7 does not properly initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The rfcomm_sock_recvmsg function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The caif_seqpkt_recvmsg function in net/caif/caif_socket.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The irda_recvmsg_dgram function in net/irda/af_irda.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The iucv_sock_recvmsg function in net/iucv/af_iucv.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The llc_ui_recvmsg function in net/llc/af_llc.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The nr_recvmsg function in net/netrom/af_netrom.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The rose_recvmsg function in net/rose/af_rose.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

net/tipc/socket.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure and a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The ftrace implementation in the Linux kernel before 3.8.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for write access to the (1) set_ftrace_pid or (2) set_graph_function file, and then making an lseek system call.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The udp_v6_push_pending_frames function in net/ipv6/udp.c in the IPv6 implementation in the Linux kernel through 3.10.3 makes an incorrect function call for pending data, which allows local users to cause a denial of service (BUG and system crash) via a crafted application that uses the UDP_CORK option in a setsockopt system call.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The ip6_append_data_mtu function in net/ipv6/ip6_output.c in the IPv6 implementation in the Linux kernel through 3.10.3 does not properly maintain information about whether the IPV6_MTU setsockopt option had been specified, which allows local users to cause a denial of service (BUG and system crash) via a crafted application that uses the UDP_CORK option in a setsockopt system call.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

Interpretation conflict in drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6 allows remote authenticated users to obtain sensitive information or modify data via a crafted mapping to a snapshot block device.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

Off-by-one error in the get_prng_bytes function in crypto/ansi_cprng.c in the Linux kernel through 3.11.4 makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via multiple requests for small amounts of data, leading to improper management of the state of the consumed data.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsockopt system call and sends both short and long packets, related to the ip_ufo_append_data function in net/ipv4/ip_output.c and the ip6_ufo_append_data function in net/ipv6/ip6_output.c.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

Multiple integer overflows in Alchemy LCD frame-buffer drivers in the Linux kernel before 3.12 allow local users to create a read-write memory mapping for the entirety of kernel memory, and consequently gain privileges, via crafted mmap operations, related to the (1) au1100fb_fb_mmap function in drivers/video/au1100fb.c and the (2) au1200fb_fb_mmap function in drivers/video/au1200fb.c.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

Multiple buffer overflows in drivers/staging/wlags49_h2/wl_priv.c in the Linux kernel before 3.12 allow local users to cause a denial of service or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability and providing a long station-name string, related to the (1) wvlan_uil_put_info and (2) wvlan_set_station_nickname functions.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The bcm_char_ioctl function in drivers/staging/bcm/Bcmchar.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via an IOCTL_BCM_GET_DEVICE_DRIVER_INFO ioctl call.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The ath9k_htc_set_bssid_mask function in drivers/net/wireless/ath/ath9k/htc_drv_main.c in the Linux kernel through 3.12 uses a BSSID masking approach to determine the set of MAC addresses on which a Wi-Fi device is listening, which allows remote attackers to discover the original MAC address after spoofing by sending a series of packets to MAC addresses with certain bit manipulations.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The apic_get_tmcct function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via crafted modifications of the TMICT value.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges or cause a denial of service (system crash) via a VAPIC synchronization operation involving a page-end address.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The lbs_debugfs_write function in drivers/net/wireless/libertas/debugfs.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service (OOPS) by leveraging root privileges for a zero-length write operation.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The aac_send_raw_srb function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 3.12.1 does not properly validate a certain size value, which allows local users to cause a denial of service (invalid pointer dereference) or possibly have unspecified other impact via an FSACTL_SEND_RAW_SRB ioctl call that triggers a crafted SRB command.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

Multiple buffer underflows in the XFS implementation in the Linux kernel through 3.12.1 allow local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for a (1) XFS_IOC_ATTRLIST_BY_HANDLE or (2) XFS_IOC_ATTRLIST_BY_HANDLE_32 ioctl call with a crafted length value, related to the xfs_attrlist_by_handle function in fs/xfs/xfs_ioctl.c and the xfs_compat_attrlist_by_handle function in fs/xfs/xfs_ioctl32.c.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2013-7266, CVE-2013-7267, CVE-2013-7268, CVE-2013-7269, CVE-2013-7270, CVE-2013-7271. Reason: This candidate is a duplicate of CVE-2013-7266, CVE-2013-7267, CVE-2013-7268, CVE-2013-7269, CVE-2013-7270, and CVE-2013-7271. Notes: All CVE users should reference CVE-2013-7266, CVE-2013-7267, CVE-2013-7268, CVE-2013-7269, CVE-2013-7270, and/or CVE-2013-7271 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The microcode on AMD 16h 00h through 0Fh processors does not properly handle the interaction between locked instructions and write-combined memory types, which allows local users to cause a denial of service (system hang) via a crafted application, aka the errata 793 issue.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The ieee80211_radiotap_iterator_init function in net/wireless/radiotap.c in the Linux kernel before 3.11.7 does not check whether a frame contains any data outside of the header, which might allow attackers to cause a denial of service (buffer over-read) via a crafted header.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The Linux kernel before 3.12.4 updates certain length values before ensuring that associated data structures have been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call, related to net/ipv4/ping.c, net/ipv4/raw.c, net/ipv4/udp.c, net/ipv6/raw.c, and net/ipv6/udp.c.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The l2tp_ip_recvmsg function in net/l2tp/l2tp_ip.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The pn_recvmsg function in net/phonet/datagram.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The rds_ib_laddr_check function in net/rds/ib.c in the Linux kernel before 3.12.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The get_rx_bufs function in drivers/vhost/net.c in the vhost-net subsystem in the Linux kernel package before 2.6.32-431.11.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly handle vhost_get_vq_desc errors, which allows guest OS users to cause a denial of service (host OS crash) via unspecified vectors.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The cifs_iovec_write function in fs/cifs/file.c in the Linux kernel through 3.13.5 does not properly handle uncached write operations that copy fewer than the requested number of bytes, which allows local users to obtain sensitive information from kernel memory, cause a denial of service (memory corruption and system crash), or possibly gain privileges via a writev system call with a crafted pointer.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.13.6 does not validate certain auth_enable and auth_capable fields before making an sctp_sf_authenticate call, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via an SCTP handshake with a modified INIT chunk and a crafted AUTH chunk before a COOKIE_ECHO chunk.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

Use-after-free vulnerability in the skb_segment function in net/core/skbuff.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The ioapic_deliver function in virt/kvm/ioapic.c in the Linux kernel through 3.14.1 does not properly validate the kvm_irq_delivery_to_apic return value, which allows guest OS users to cause a denial of service (host OS crash) via a crafted entry in the redirection table of an I/O APIC. NOTE: the affected code was moved to the ioapic_service function before the vulnerability was announced.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The fst_get_iface function in drivers/net/wan/farsync.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCWANDEV ioctl call.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The wanxl_ioctl function in drivers/net/wan/wanxl.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via an ioctl call.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The yam_ioctl function in drivers/net/hamradio/yam.c in the Linux kernel before 3.12.8 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCYAMGCFG ioctl call.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly handle error conditions during processing of an FDRAWCMD ioctl call, which allows local users to trigger kfree operations and gain privileges by leveraging write access to a /dev/fd device.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The raw_cmd_copyout function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly restrict access to certain pointers during processing of an FDRAWCMD ioctl call, which allows local users to obtain sensitive information from kernel heap memory by leveraging write access to a /dev/fd device.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The media_device_enum_entities function in drivers/media/media-device.c in the Linux kernel before 3.14.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The security_context_to_sid_core function in security/selinux/ss/services.c in the Linux kernel before 3.13.4 allows local users to cause a denial of service (system crash) by leveraging the CAP_MAC_ADMIN capability to set a zero-length security context.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The ip6_route_add function in net/ipv6/route.c in the Linux kernel through 3.13.6 does not properly count the addition of routes, which allows remote attackers to cause a denial of service (memory consumption) via a flood of ICMPv6 Router Advertisement packets.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The rds_iw_laddr_check function in net/rds/iw.c in the Linux kernel through 3.14 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

Race condition in the mac80211 subsystem in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via network traffic that improperly interacts with the WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and tx.c.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The try_to_unmap_cluster function in mm/rmap.c in the Linux kernel before 3.14.3 does not properly consider which pages must be locked, which allows local users to cause a denial of service (system crash) by triggering a memory-usage pattern that requires removal of page-table mappings.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The BPF_S_ANC_NLATTR_NEST extension implementation in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 uses the reverse order in a certain subtraction, which allows local users to cause a denial of service (over-read and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr_nest function before the vulnerability was announced.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

Multiple stack-based buffer overflows in the magicmouse_raw_event function in drivers/hid/hid-magicmouse.c in the Magic Mouse HID driver in the Linux kernel through 3.16.3 allow physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with an event.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The report_fixup functions in the HID subsystem in the Linux kernel before 3.16.2 might allow physically proximate attackers to cause a denial of service (out-of-bounds write) via a crafted device that provides a small report descriptor, related to (1) drivers/hid/hid-cherry.c, (2) drivers/hid/hid-kye.c, (3) drivers/hid/hid-lg.c, (4) drivers/hid/hid-monterey.c, (5) drivers/hid/hid-petalynx.c, and (6) drivers/hid/hid-sunplus.c.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

Multiple buffer overflows in the command_port_read_callback function in drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver in the Linux kernel before 3.16.2 allow physically proximate attackers to execute arbitrary code or cause a denial of service (memory corruption and system crash) via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with a bulk response.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

Buffer overflow in the picolcd_raw_event function in devices/hid/hid-picolcd_core.c in the PicoLCD HID device driver in the Linux kernel through 3.16.3, as used in Android on Nexus 7 devices, allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted device that sends a large report.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.16.1 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to (1) cause a denial of service (host OS memory corruption) or possibly have unspecified other impact by triggering a large gfn value or (2) cause a denial of service (host OS memory consumption) by triggering a small gfn value that leads to permanently pinned pages.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The WRMSR processing functionality in the KVM subsystem in the Linux kernel through 3.17.2 does not properly handle the writing of a non-canonical address to a model-specific register, which allows guest OS users to cause a denial of service (host OS crash) by leveraging guest OS privileges, related to the wrmsr_interception function in arch/x86/kvm/svm.c and the handle_wrmsr function in arch/x86/kvm/vmx.c.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through 3.17.2 does not have an exit handler for the INVVPID instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (system crash) via a malformed ASCONF chunk, related to net/sctp/sm_make_chunk.c and net/sctp/sm_statefuns.c.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The sctp_assoc_lookup_asconf_ack function in net/sctp/associola.c in the SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (panic) via duplicate ASCONF chunks that trigger an incorrect uncork within the side-effect interpreter.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The SCTP implementation in the Linux kernel before 3.17.4 allows remote attackers to cause a denial of service (memory consumption) by triggering a large number of chunks in an association's output queue, as demonstrated by ASCONF probes, related to net/sctp/inqueue.c and net/sctp/sm_statefuns.c.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.17.2 on Intel processors does not ensure that the value in the CR4 control register remains the same after a VM entry, which allows host OS users to kill arbitrary processes or cause a denial of service (system disruption) by leveraging /dev/kvm access, as demonstrated by PR_SET_TSC prctl calls within a modified copy of QEMU.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

mm/shmem.c in the Linux kernel through 3.15.1 does not properly implement the interaction between range notification and hole punching, which allows local users to cause a denial of service (i_mutex hold) by using the mmap system call to access a hole, as demonstrated by interfering with intended shmem activity by blocking completion of (1) an MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype."


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

Race condition in the tlv handler functionality in the snd_ctl_elem_user_tlv function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allows local users to obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which allows local users to cause a denial of service (use-after-free) and obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not check authorization for SNDRV_CTL_IOCTL_ELEM_REPLACE commands, which allows local users to remove kernel controls and cause a denial of service (use-after-free and system crash) by leveraging /dev/snd/controlCX access for an ioctl call.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not properly maintain the user_ctl_count value, which allows local users to cause a denial of service (integer overflow and limit bypass) by leveraging /dev/snd/controlCX access for a large number of SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl calls.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

Multiple integer overflows in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allow local users to cause a denial of service by leveraging /dev/snd/controlCX access, related to (1) index values in the snd_ctl_add function and (2) numid values in the snd_ctl_remove_numid_conflict function.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The sctp_association_free function in net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly manage a certain backlog value, which allows remote attackers to cause a denial of service (socket outage) via a crafted SCTP packet.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

Stack consumption vulnerability in the parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (uncontrolled recursion, and system crash or reboot) via a crafted iso9660 image with a CL entry referring to a directory entry that has a CL entry.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (unkillable mount process) via a crafted iso9660 image with a self-referential CL entry.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The __udf_read_inode function in fs/udf/inode.c in the Linux kernel through 3.16.3 does not restrict the amount of ICB indirection, which allows physically proximate attackers to cause a denial of service (infinite loop or stack consumption) via a UDF filesystem with a crafted inode.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The implementation of certain splice_write file operations in the Linux kernel before 3.16 does not enforce a restriction on the maximum size of a single file, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted splice system call, as demonstrated by use of a file descriptor associated with an ext4 filesystem.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does not properly handle private syscall numbers during use of the ftrace subsystem, which allows local users to gain privileges or cause a denial of service (invalid pointer dereference) via a crafted application.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

Race condition in arch/x86/kvm/x86.c in the Linux kernel before 3.17.4 allows guest OS users to cause a denial of service (guest OS crash) via a crafted application that performs an MMIO transaction or a PIO transaction to trigger a guest userspace emulation error report, a similar issue to CVE-2010-5313.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The pivot_root implementation in fs/namespace.c in the Linux kernel through 3.17 does not properly interact with certain locations of a chroot directory, which allows local users to cause a denial of service (mount-tree loop) via . (dot) values in both arguments to the pivot_root system call.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

Race condition in the ext4_file_write_iter function in fs/ext4/file.c in the Linux kernel through 3.17 allows local users to cause a denial of service (file unavailability) via a combination of a write action and an F_SETFL fcntl operation for the O_DIRECT flag.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The paravirt_ops_setup function in arch/x86/kernel/kvm.c in the Linux kernel through 3.18 uses an improper paravirt_enabled setting for KVM guest kernels, which makes it easier for guest OS users to bypass the ASLR protection mechanism via a crafted application that reads a 16-bit value.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The InfiniBand (IB) implementation in the Linux kernel package before 2.6.32-504.12.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly restrict use of User Verbs for registration of memory regions, which allows local users to access arbitrary physical memory locations, and consequently cause a denial of service (system crash) or gain privileges, by leveraging permissions on a uverbs device under /dev/infiniband/.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disallowed port numbers.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.17.2 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to cause a denial of service (host OS page unpinning) or possibly have unspecified other impact by leveraging guest OS privileges. NOTE: this vulnerability exists because of an incorrect fix for CVE-2014-3601.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The d_walk function in fs/dcache.c in the Linux kernel through 3.17.2 does not properly maintain the semantics of rename_lock, which allows local users to cause a denial of service (deadlock and system hang) via a crafted application.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The ieee80211_fragment function in net/mac80211/tx.c in the Linux kernel before 3.13.5 does not properly maintain a certain tail pointer, which allows remote attackers to obtain sensitive cleartext information by reading packets.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

Stack-based buffer overflow in the ttusbdecfe_dvbs_diseqc_send_master_cmd function in drivers/media/usb/ttusb-dec/ttusbdecfe.c in the Linux kernel before 3.17.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via a large message length in an ioctl call.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The do_double_fault function in arch/x86/kernel/traps.c in the Linux kernel through 3.17.4 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to cause a denial of service (panic) via a modify_ldt system call, as demonstrated by sigreturn_32 in the linux-clock-tests test suite.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel through 3.18.1 does not ensure that Thread Local Storage (TLS) descriptors are loaded before proceeding with other steps, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application that reads a TLS base address.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The rock_continue function in fs/isofs/rock.c in the Linux kernel through 3.18.1 does not restrict the number of Rock Ridge continuation entries, which allows local users to cause a denial of service (infinite loop, and system crash or hang) via a crafted iso9660 image.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

Race condition in the key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 3.18.2 allows local users to cause a denial of service (memory corruption or panic) or possibly have unspecified other impact via keyctl commands that trigger access to a key structure member during garbage collection of a key.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel before 3.18.2 does not validate a length value in the Extensions Reference (ER) System Use Field, which allows local users to obtain sensitive information from kernel memory via a crafted iso9660 image.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The vdso_addr function in arch/x86/vdso/vma.c in the Linux kernel through 3.18.2 does not properly choose memory locations for the vDSO area, which makes it easier for local users to bypass the ASLR protection mechanism by guessing a location at the end of a PMD.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0 (aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions, allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory via unspecified vectors.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

Use-after-free vulnerability in the sctp_assoc_update function in net/sctp/associola.c in the Linux kernel before 3.18.8 allows remote attackers to cause a denial of service (slab corruption and panic) or possibly have unspecified other impact by triggering an INIT collision that leads to improper handling of shared-key data.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The stack randomization feature in the Linux kernel before 3.19.1 on 64-bit platforms uses incorrect data types for the results of bitwise left-shift operations, which makes it easier for attackers to bypass the ASLR protection mechanism by predicting the address of the top of the stack, related to the randomize_stack_top function in fs/binfmt_elf.c and the stack_maxrandom_size function in arch/x86/mm/mmap.c.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

net/llc/sysctl_net_llc.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

net/rds/sysctl.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrated by an attack against seccomp before 3.16.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel before 3.19.6 allows local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but the setuid bit is not yet stripped.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки

Описание

The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 does not initialize a certain list data structure during an unhash operation, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) by leveraging the ability to make a SOCK_DGRAM socket system call for the IPPROTO_ICMP or IPPROTO_ICMPV6 protocol, and then making a connect system call after a disconnect.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:kernel-bigsmp-devel-3.0.101-0.47.55.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-base-3.0.101-0.40.1
SUSE Linux Enterprise Desktop 11 SP3:kernel-default-devel-3.0.101-0.40.1

Ссылки
Уязвимость SUSE-SU-2015:0581-1