| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
crash dues to AP powersave TX vs. wakeup race
Reference:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706
Reference to upstream fix:
https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/
commit/?id=a7ee1a84a81555b19ec3d02f104bfd70cf0b668a
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Signed-off-by: Tudor Florea <tudor.florea@enea.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Fixes privilege escalation via FDRAWCMD floppy ioctl command
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1737
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1738
Reference to upstream fixes:
CVE-2014-1737:
https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/
commit/?id=21506304588afab20b2d52aaa56b70e85aca6386
CVE-2014-1738:
https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/
commit/?id=50c648e394a0968f19d448b70bec82da88219963
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Signed-off-by: Tudor Florea <tudor.florea@enea.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Improve create VCPU parameter (CVE-2013-4587)
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4587
Reference to upstream fix:
https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/
commit/?id=f4d838225e0cbdc8099c2eb8d55dd9406def1f33
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Signed-off-by: Tudor Florea <tudor.florea@enea.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
flow_dissector: fail on evil iph->ihl
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4348
Reference to upstream fix:
https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/
commit/?id=666a76c79fc23fef31fb870193053464148ba488
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Signed-off-by: Tudor Florea <tudor.florea@enea.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Fix off-by-one bug in build_unc_path_to_root
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4247
Reference to upstream fix:
https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/
commit/?id=1fc29bacedeabb278080e31bb9c1ecb49f143c3b
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Signed-off-by: Tudor Florea <tudor.florea@enea.com>
|
|
|
|
|
|
|
|
|
|
|
| |
This fixes incorrect processing of checksums in UDP implementation
References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5364
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5366
http://www.openwall.com/lists/oss-security/2015/07/10/3
Signed-off-by: Tudor Florea <tudor.florea@enea.com>
|
|
|
|
|
|
|
|
|
| |
NULL pointer dereference in kvm_apic_has_events function
References:
http://www.openwall.com/lists/oss-security/2015/06/21/1
Signed-off-by: Tudor Florea <tudor.florea@enea.com>
|
|
|
|
|
|
|
|
|
|
|
|
| |
Fixes a flaw in the way the Linux kernel's 32-bit
emulation implementation handled forking or closing
of a task with an 'int80' entry.
References:
http://seclists.org/oss-sec/2015/q2/8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2830
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
|
|
|
| |
Fixes buffer overruns in RFC4106 implementation using
AESNI.
References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3331
http://www.openwall.com/lists/oss-security/2015/04/18/1
https://software.intel.com/en-us/articles/intel-advanced-encryption-standard-in
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
|
| |
Fixes incorret data type in rds_sysctl_rds_table
References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2042
http://www.openwall.com/lists/oss-security/2015/02/20/20
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
| |
disable the compiling of valgrind 3.9 ptests for
zc702-zynq7 target
Signed-off-by: Tudor Florea <tudor.florea@enea.com>
|
|
|
|
|
|
|
|
|
| |
Insufficient sysenter emulation when invoked from 16-bit code
References:
http://www.openwall.com/lists/oss-security/2015/01/27/6
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
|
| |
Fix stack randomization on 64-bit systems
References:
http://hmarco.org/bugs/linux-ASLR-integer-overflow.html
http://www.openwall.com/lists/oss-security/2015/02/13/13
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
| |
Prevent integer overflow in ib_umem_get address arithmetic
Reference
http://www.securitytracker.com/id/1032224
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Fixes an information leakage flaw in the Linux kernel built
with the iso9660 file system(CONFIG_ISO9660_FS). This could
occur while accessing data on an iso9660 image with RockRidge
extension reference(ER) records.
Reference
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9584
http://www.openwall.com/lists/oss-security/2015/01/09/4
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
|
|
|
| |
Fixes iptables restriction bypass if a protocol handler kernel
module is not loaded.
References
- -----------
-> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8160
-> http://www.openwall.com/lists/oss-security/2015/01/14/3
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
|
|
|
| |
Fixes an integer overflow flaw in the Linux kernel's netfilter
connection tracking implementation
References:
- -----------
-> http://marc.info/?l=netfilter-devel&m=140112364215200&w=2
-> http://www.openwall.com/lists/oss-security/2015/04/08/1
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
|
| |
Fixes a leak of the high 16 bits of the kernel stack address
on 32-bit KVM paravirt guests.
Reference
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8134
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Fixes a use-after-free flaw in the sctp_assoc_update
function in net/sctp/associola.c in the Linux kernel
before 3.18.8. A remote attacker could use this flaw to
crash the system or, potentially, escalate their privileges
on the system.
Reference
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1421
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
| |
Fixes buffer overflow in ioctl
Reference
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8884
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
| |
Fix for CVE-2014-3690.
Reference
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3690
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
|
| |
This fixes a 1-byte NULL write past the end of allocated memory
References
http://seclists.org/oss-sec/2015/q1/582
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9683
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
|
| |
It was found that routing packets to too many different
dsts/too fast can lead to a excessive resource consumption.
A remote attacker can use this flaw to crash the system.
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1465
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
|
| |
partial ASLR bypass through TLS base addresses leak
Reference:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9419
http://www.openwall.com/lists/oss-security/2014/12/18/17
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
| |
Fixes security/keys/gc.c race condition
Reference
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9529
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
| |
Fix infoleak in ioctl media_enum_entities()
Reference
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Insufficient syscall number validation in perf and ftrace subsystems
CVE-2014-7825
Fixes an out-of-bounds memory access flaw, in the syscall tracing
functionality of the Linux kernel's perf subsystem.
CVE-2014-7826
Fixes an out-of-bounds memory access flaw, in the syscall
tracing functionality of the Linux kernel's ftrace subsystem.
References:
http://www.openwall.com/lists/oss-security/2014/11/06/11
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7825
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7826
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
|
|
| |
Fixes a potential privilege escalation flaw when the
Linux kernel is built with the user namespaces(CONFIG_USER_NS)
References:
http://www.openwall.com/lists/oss-security/2014/06/10/4
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4014
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
|
|
| |
Fix for a denial of service flaw in the Linux kernel
built with the shared memory suppor
Reference
http://www.openwall.com/lists/oss-security/2014/06/18/11
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
| |
try_to_unmap_cluster() should lock_page() before mlocking
Reference
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3122
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
| |
Fixes refcount issue in ping_init_sock() function
Reference
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2851
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
|
|
| |
A remote attacker could use a race condition flaw in the
ath_tx_aggr_sleep() function to crash the system by creating large
network traffic on the system's Atheros 9k wireless network adapter.
Reference
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2672
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
| |
Fixes dereference of a NULL device in rds_ib_laddr_check()
Reference
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7339
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
| |
Fixes incorrect skb_header_pointer API usages
Reference
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2523
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
|
| |
Fixes incorrect handling of bogus user pointers during uncached writes
Reference
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0069
Signen-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
| |
CVE-2014-1444 farsync: fix info leak in ioctl
CVE-2014-1445 wanxl: fix info leak in ioctl
CVE-2014-1446 hamradio/yam: fix info leak in ioctl
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
| |
Fixes infinite loop in CE record entries
Reference
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9420
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
|
| |
Explicitly clear ramdisk_mcp backend pages
Reference
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027
http://permalink.gmane.org/gmane.linux.scsi.target.devel/6618
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
|
|
| |
Handle numid overflow
Make sure that id->index does not overflow
References:
http://www.openwall.com/lists/oss-security/2014/06/26/6
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4656
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
| |
NULL pointer dereference in af->from_addr_param on malformed packet
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7841
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
|
|
|
| |
remote memory pressure from excessive queueing
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3688
Fixes: b896b82be4ae ("[SCTP] ADDIP: Support for processing
incoming ASCONF_ACK chunks.")
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
|
|
|
| |
panic on duplicate ASCONF chunks
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3687
Fixes: b896b82be4ae ("[SCTP] ADDIP: Support for processing
incoming ASCONF_ACK chunks.")
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
|
|
|
| |
skb_over_panic when receiving malformed ASCONF chunks
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3673
Fixes: b896b82be4ae ("[SCTP] ADDIP: Support for processing
incoming ASCONF_ACK chunks.")
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
| |
Fixes sctp_sf_do_5_1D_ce to verify if we/peer is AUTH capable
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0101
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
|
|
| |
Fixes excessive pages un-pinning in kvm_iommu_map error path.
(This vulnerability exists because of an incorrect fix for CVE-2014-3601)
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8369
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
|
|
| |
Fixes the third parameter of kvm_iommu_put_pages
The third parameter of kvm_iommu_put_pages is wrong,
It should be 'gfn - slot->base_gfn'.
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3601
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2014-3181 Kernel: HID: OOB write in magicmouse driver
CVE-2014-3182 Kernel: HID: logitech-dj OOB array access
CVE-2014-3184 Kernel: HID: off by one error in various _report_fixup routines
CVE-2014-3185 Kernel: USB serial: memory corruption flaw
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3181
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3182
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3184
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3185
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
| |
audit_krule mask accesses need bounds checking
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3917
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2014-4652
Protect user controls against concurrent access
CVE-2014-4653
Don't access controls outside of protected regions
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4652
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4653
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|
|
|
|
|
|
|
|
|
| |
Linux kernel: sctp: sk_ack_backlog wrap-around problem
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
|