Revision Date: | 2015-01-26 | Version: | 3 |
Title: | USN-2418-1 -- Linux kernel (OMAP4) vulnerabilities |
Description: | Nadav Amit reported that the KVM (Kernel Virtual Machine) mishandlesnoncanonical addresses when emulating instructions that change the rip(Instruction Pointer). A guest user with access to I/O or the MMIO can usethis flaw to cause a denial of service (system crash) of the guest.(CVE-2014-3647)A flaw was discovered with the handling of the invept instruction in theKVM (Kernel Virtual Machine) subsystem of the Linux kernel. An unprivilegedguest user could exploit this flaw to cause a denial of service (systemcrash) on the guest. (CVE-2014-3646)A flaw was discovered with invept instruction support when using nested EPTin the KVM (Kernel Virtual Machine). An unprivileged guest user couldexploit this flaw to cause a denial of service (system crash) on the guest.(CVE-2014-3645)Lars Bull reported a race condition in the PIT (programmable interrupttimer) emulation in the KVM (Kernel Virtual Machine) subsystem of the Linuxkernel. A local guest user with access to PIT i/o ports could exploit thisflaw to cause a denial of service (crash) on the host. (CVE-2014-3611)Lars Bull and Nadav Amit reported a flaw in how KVM (the Kernel VirtualMachine) handles noncanonical writes to certain MSR registers. A privilegedguest user can exploit this flaw to cause a denial of service (kernelpanic) on the host. (CVE-2014-3610)A flaw in the handling of malformed ASCONF chunks by SCTP (Stream ControlTransmission Protocol) implementation in the Linux kernel was discovered. Aremote attacker could exploit this flaw to cause a denial of service(system crash). (CVE-2014-3673)A flaw in the handling of duplicate ASCONF chunks by SCTP (Stream ControlTransmission Protocol) implementation in the Linux kernel was discovered. Aremote attacker could exploit this flaw to cause a denial of service(panic). (CVE-2014-3687)It was discovered that excessive queuing by SCTP (Stream ControlTransmission Protocol) implementation in the Linux kernel can cause memorypressure. A remote attacker could exploit this flaw to cause a denial ofservice. (CVE-2014-3688)A flaw was discovered in how the Linux kernel's KVM (Kernel VirtualMachine) subsystem handles the CR4 control register at VM entry on Intelprocessors. A local host OS user can exploit this to cause a denial ofservice (kill arbitrary processes, or system disruption) by leveraging/dev/kvm access. (CVE-2014-3690)Don Bailey discovered a flaw in the LZO decompress algorithm used by theLinux kernel. An attacker could exploit this flaw to cause a denial ofservice (memory corruption or OOPS). (CVE-2014-4608)It was discovered the Linux kernel's implementation of IPv6 did notproperly validate arguments in the ipv6_select_ident function. A local usercould exploit this flaw to cause a denial of service (system crash) byleveraging tun or macvtap device access. (CVE-2014-7207)Andy Lutomirski discovered that the Linux kernel was not checking theCAP_SYS_ADMIN when remounting filesystems to read-only. A local user couldexploit this flaw to cause a denial of service (loss of writability).(CVE-2014-7975) |
Family: | unix | Class: | patch |
Status: | ACCEPTED | Reference(s): | CVE-2014-3610 CVE-2014-3611 CVE-2014-3645 CVE-2014-3646 CVE-2014-3647 CVE-2014-3673 CVE-2014-3687 CVE-2014-3688 CVE-2014-3690 CVE-2014-4608 CVE-2014-7207 CVE-2014-7975 USN-2418-1
|
Platform(s): | Ubuntu 12.04
| Product(s): | linux-ti-omap4
|
Definition Synopsis |
Ubuntu 12.04 is installed AND linux-image-3.2.0-1456-omap4 is earlier than 0:3.2.0-1456.76
|