ID

VAR-201406-0230


CVE

CVE-2014-4027


TITLE

Linux kernel of drivers/target/target_core_rd.c Inside rd_build_device_space Vulnerabilities that capture important information in functions

Trust: 0.8

sources: JVNDB: JVNDB-2014-003017

DESCRIPTION

The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator. Linux Kernel is prone to an information-disclosure vulnerability. An attacker can exploit this issue to obtain sensitive information; information obtained may aid in other attacks. Linux Kernel 2.6.38 through versions prior to 3.14 are affected. The NFSv4 implementation is one of the distributed file system protocols. The vulnerability is due to the fact that the program does not initialize the data structure correctly. ============================================================================ Ubuntu Security Notice USN-2336-1 September 02, 2014 linux-lts-trusty vulnerabilities ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 LTS Summary: Several security issues were fixed in the kernel. Software Description: - linux-lts-trusty: Linux hardware enablement kernel from Trusty Details: A flaw was discovered in the Linux kernel virtual machine's (kvm) validation of interrupt requests (irq). A guest OS user could exploit this flaw to cause a denial of service (host OS crash). (CVE-2014-0155) Andy Lutomirski discovered a flaw in the authorization of netlink socket operations when a socket is passed to a process of more privilege. A local user could exploit this flaw to bypass access restrictions by having a privileged executable do something it was not intended to do. (CVE-2014-0181) An information leak was discovered in the Linux kernels aio_read_events_ring function. (CVE-2014-0206) A flaw was discovered in the Linux kernel's implementation of user namespaces with respect to inode permissions. A local user could exploit this flaw by creating a user namespace to gain administrative privileges. (CVE-2014-4014) An information leak was discovered in the rd_mcp backend of the iSCSI target subsystem in the Linux kernel. (CVE-2014-4027) Sasha Levin reported an issue with the Linux kernel's shared memory subsystem when used with range notifications and hole punching. A local user could exploit this flaw to cause a denial of service. (CVE-2014-4171) Toralf F=C3=B6rster reported an error in the Linux kernels syscall auditing on 32 bit x86 platforms. A local user could exploit this flaw to cause a denial of service (OOPS and system crash). (CVE-2014-4508) An information leak was discovered in the control implemenation of the Advanced Linux Sound Architecture (ALSA) subsystem in the Linux kernel. (CVE-2014-4652) A use-after-free flaw was discovered in the Advanced Linux Sound Architecture (ALSA) control implementation of the Linux kernel. A local user could exploit this flaw to cause a denial of service (system crash). (CVE-2014-4653) A authorization bug was discovered with the snd_ctl_elem_add function of the Advanced Linux Sound Architecture (ALSA) in the Linux kernel. A local user could exploit his bug to cause a denial of service (remove kernel controls). (CVE-2014-4654) A flaw discovered in how the snd_ctl_elem function of the Advanced Linux Sound Architecture (ALSA) handled a reference count. A local user could exploit this flaw to cause a denial of service (integer overflow and limit bypass). (CVE-2014-4655) An integer overflow flaw was discovered in the control implementation of the Advanced Linux Sound Architecture (ALSA). A local user could exploit this flaw to cause a denial of service (system crash). (CVE-2014-4656) An integer underflow flaw was discovered in the Linux kernel's handling of the backlog value for certain SCTP packets. A remote attacker could exploit this flaw to cause a denial of service (socket outage) via a crafted SCTP packet. (CVE-2014-4667) Vasily Averin discover a reference count flaw during attempts to umount in conjunction with a symlink. A local user could exploit this flaw to cause a denial of service (memory consumption or use after free) or possibly have other unspecified impact. (CVE-2014-5045) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 LTS: linux-image-3.13.0-35-generic 3.13.0-35.62~precise1 linux-image-3.13.0-35-generic-lpae 3.13.0-35.62~precise1 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. If you use linux-restricted-modules, you have to update that package as well to get modules which work with the new kernel version. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-server, linux-powerpc), a standard system upgrade will automatically perform this as well. References: http://www.ubuntu.com/usn/usn-2336-1 CVE-2014-0155, CVE-2014-0181, CVE-2014-0206, CVE-2014-4014, CVE-2014-4027, CVE-2014-4171, CVE-2014-4508, CVE-2014-4652, CVE-2014-4653, CVE-2014-4654, CVE-2014-4655, CVE-2014-4656, CVE-2014-4667, CVE-2014-5045 Package Information: https://launchpad.net/ubuntu/+source/linux-lts-trusty/3.13.0-35.62~precise1 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2014:155 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : kernel Date : August 7, 2014 Affected: Business Server 1.0 _______________________________________________________________________ Problem Description: Multiple vulnerabilities has been found and corrected in the Linux kernel: Multiple buffer overflows in drivers/staging/wlags49_h2/wl_priv.c in the Linux kernel before 3.12 allow local users to cause a denial of service or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability and providing a long station-name string, related to the (1) wvlan_uil_put_info and (2) wvlan_set_station_nickname functions (CVE-2013-4514). The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls (CVE-2014-4699). The updated packages provides a solution for these security issues. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4514 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0131 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4608 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4652 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4653 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4654 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4655 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4656 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4699 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943 _______________________________________________________________________ Updated Packages: Mandriva Business Server 1/X86_64: c2f39cb08d096b60bc8bbd2ae8f11e19 mbs1/x86_64/cpupower-3.4.100-1.1.mbs1.x86_64.rpm 3db9df4dbdd04f72ef30734bbb001322 mbs1/x86_64/kernel-firmware-3.4.100-1.1.mbs1.noarch.rpm c4abbe488cd50058ee544f6c39c8ea95 mbs1/x86_64/kernel-headers-3.4.100-1.1.mbs1.x86_64.rpm aee7594e36d538798a7d0ac4f0ba4c47 mbs1/x86_64/kernel-server-3.4.100-1.1.mbs1.x86_64.rpm a2cfe35a3117b2cfe3de75589612b540 mbs1/x86_64/kernel-server-devel-3.4.100-1.1.mbs1.x86_64.rpm 75fffbe82cefb6e8cfdc502c8dfdbd9a mbs1/x86_64/lib64cpupower0-3.4.100-1.1.mbs1.x86_64.rpm fe94d08a35090e84cec11a1d03cd38d8 mbs1/x86_64/lib64cpupower-devel-3.4.100-1.1.mbs1.x86_64.rpm 0a9dab31e19cf4740e0f10dd58ae031c mbs1/x86_64/perf-3.4.100-1.1.mbs1.x86_64.rpm f34e4ceff2962eb6e7177043e4b0fd2f mbs1/SRPMS/cpupower-3.4.100-1.1.mbs1.src.rpm 9ee8ebf3071324459be1970d8dc3c3e0 mbs1/SRPMS/kernel-firmware-3.4.100-1.1.mbs1.src.rpm faefe75b8ba9efdc50f8028700991a7c mbs1/SRPMS/kernel-headers-3.4.100-1.1.mbs1.src.rpm 845229627d2cb959547db1cbfe81753f mbs1/SRPMS/kernel-server-3.4.100-1.1.mbs1.src.rpm 30b1055810489c6b4e89623c7768e182 mbs1/SRPMS/perf-3.4.100-1.1.mbs1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/en/support/security/advisories/ If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iD8DBQFT4yfXmqjQ0CJFipgRAuk5AKDbuUKogDrhb4iKIs1yOP4IQdpAcwCgodf8 OMQTfJFCDxSAMSI8iUevOkc= =mxBf -----END PGP SIGNATURE----- . (CVE-2014-4943) Michael S

Trust: 2.52

sources: NVD: CVE-2014-4027 // JVNDB: JVNDB-2014-003017 // BID: 68159 // VULHUB: VHN-71967 // PACKETSTORM: 128090 // PACKETSTORM: 127788 // PACKETSTORM: 128089 // PACKETSTORM: 127515 // PACKETSTORM: 128088 // PACKETSTORM: 128091

AFFECTED PRODUCTS

vendor:linuxmodel:kernelscope:ltversion:3.14

Trust: 1.8

vendor:f5model:big-ip local traffic managerscope:gteversion:11.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:6.0

Trust: 1.0

vendor:f5model:big-iq cloudscope:lteversion:4.5.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:11.1.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:11.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:11.6.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:11.3.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:eqversion:12.0.0

Trust: 1.0

vendor:f5model:big-ip protocol security modulescope:gteversion:11.1.0

Trust: 1.0

vendor:f5model:big-iq application delivery controllerscope:eqversion:4.5.0

Trust: 1.0

vendor:susemodel:linux enterprise high availability extensionscope:eqversion:11

Trust: 1.0

vendor:f5model:big-iq devicescope:lteversion:4.5.0

Trust: 1.0

vendor:f5model:big-iq securityscope:gteversion:4.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:11.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:11.6.0

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:11

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:eqversion:12.0.0

Trust: 1.0

vendor:f5model:enterprise managerscope:gteversion:3.0.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:11.1.0

Trust: 1.0

vendor:susemodel:linux enterprise desktopscope:eqversion:11

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:lteversion:11.3.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:eqversion:12.0.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:11.6.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:11.6.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:11.4.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:11.1.0

Trust: 1.0

vendor:f5model:big-iq cloudscope:gteversion:4.0.0

Trust: 1.0

vendor:f5model:big-iq devicescope:gteversion:4.2.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:11.6.0

Trust: 1.0

vendor:f5model:big-ip wan optimization managerscope:gteversion:11.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:12.0.0

Trust: 1.0

vendor:f5model:big-iq securityscope:lteversion:4.5.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:11.6.0

Trust: 1.0

vendor:susemodel:linux enterprise real time extensionscope:eqversion:11

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:11.6.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:lteversion:11.3.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:12.0.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:11.3.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:11.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:eqversion:12.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:11.6.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:12.0.0

Trust: 1.0

vendor:f5model:big-ip protocol security modulescope:lteversion:11.4.1

Trust: 1.0

vendor:f5model:big-ip wan optimization managerscope:lteversion:11.3.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:11.6.0

Trust: 1.0

vendor:f5model:enterprise managerscope:lteversion:3.1.1

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:eqversion:12.0.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:11.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:eqversion:12.0.0

Trust: 1.0

vendor:linuxmodel:kernelscope:eqversion:3.4.37

Trust: 0.6

vendor:linuxmodel:kernelscope:eqversion:3.4.38

Trust: 0.6

vendor:linuxmodel:kernelscope:eqversion:3.4.36

Trust: 0.6

vendor:linuxmodel:kernelscope:eqversion:3.4.39

Trust: 0.6

vendor:linuxmodel:kernelscope:eqversion:3.4.34

Trust: 0.6

vendor:linuxmodel:kernelscope:eqversion:3.4.31

Trust: 0.6

vendor:linuxmodel:kernelscope:eqversion:3.4.35

Trust: 0.6

vendor:linuxmodel:kernelscope:eqversion:3.4.32

Trust: 0.6

vendor:linuxmodel:kernelscope:eqversion:3.4.33

Trust: 0.6

vendor:linuxmodel:kernelscope:eqversion:3.4.3

Trust: 0.6

vendor:linuxmodel:kernelscope:eqversion:3.3.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.3.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.3.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.1.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.1

Trust: 0.3

vendor:linuxmodel:kernel rc4scope:eqversion:2.6.39

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.39

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.38

Trust: 0.3

vendor:linuxmodel:kernel rc4scope:eqversion:2.6.9

Trust: 0.3

vendor:linuxmodel:kernel rc3scope:eqversion:2.6.9

Trust: 0.3

vendor:linuxmodel:kernel rc2scope:eqversion:2.6.9

Trust: 0.3

vendor:linuxmodel:kernel rc1scope:eqversion:2.6.9

Trust: 0.3

vendor:linuxmodel:kernel finalscope:eqversion:2.6.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.9

Trust: 0.3

vendor:linuxmodel:kernel rc4scope:eqversion:2.6.8

Trust: 0.3

vendor:linuxmodel:kernel rc3scope:eqversion:2.6.8

Trust: 0.3

vendor:linuxmodel:kernel rc2scope:eqversion:2.6.8

Trust: 0.3

vendor:linuxmodel:kernel rc1scope:eqversion:2.6.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.8

Trust: 0.3

vendor:linuxmodel:kernel rc3scope:eqversion:2.6.7

Trust: 0.3

vendor:linuxmodel:kernel rc2scope:eqversion:2.6.7

Trust: 0.3

vendor:linuxmodel:kernel rc1scope:eqversion:2.6.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.7

Trust: 0.3

vendor:linuxmodel:kernel rc3scope:eqversion:2.6.6

Trust: 0.3

vendor:linuxmodel:kernel rc2scope:eqversion:2.6.6

Trust: 0.3

vendor:linuxmodel:kernel rc1scope:eqversion:2.6.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.6

Trust: 0.3

vendor:linuxmodel:kernel rc3scope:eqversion:2.6.5

Trust: 0.3

vendor:linuxmodel:kernel rc2scope:eqversion:2.6.5

Trust: 0.3

vendor:linuxmodel:kernel rc1scope:eqversion:2.6.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.5

Trust: 0.3

vendor:linuxmodel:kernel rc3scope:eqversion:2.6.4

Trust: 0.3

vendor:linuxmodel:kernel rc2scope:eqversion:2.6.4

Trust: 0.3

vendor:linuxmodel:kernel rc1scope:eqversion:2.6.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.18

Trust: 0.3

vendor:linuxmodel:kernel 3.0-rc4-git1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernel 3.0-rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.8.1

Trust: 0.3

vendor:linuxmodel:kernel 2.6.39-rc3scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.38.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.38.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.38.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.38.2

Trust: 0.3

vendor:linuxmodel:kernel 2.6.38-rc7scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernel 2.6.38-rc4scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernel 2.6.38-rc2scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernel 2.6.38-git18scope: - version: -

Trust: 0.3

sources: BID: 68159 // JVNDB: JVNDB-2014-003017 // CNNVD: CNNVD-201406-527 // NVD: CVE-2014-4027

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-4027
value: LOW

Trust: 1.0

NVD: CVE-2014-4027
value: LOW

Trust: 0.8

CNNVD: CNNVD-201406-527
value: LOW

Trust: 0.6

VULHUB: VHN-71967
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2014-4027
severity: LOW
baseScore: 2.3
vectorString: AV:A/AC:M/AU:S/C:P/I:N/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 4.4
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-71967
severity: LOW
baseScore: 2.3
vectorString: AV:A/AC:M/AU:S/C:P/I:N/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 4.4
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-71967 // JVNDB: JVNDB-2014-003017 // CNNVD: CNNVD-201406-527 // NVD: CVE-2014-4027

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.1

problemtype:CWE-264

Trust: 0.9

sources: VULHUB: VHN-71967 // JVNDB: JVNDB-2014-003017 // NVD: CVE-2014-4027

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-201406-527

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201406-527

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-003017

PATCH

title:target/rd: Refactor rd_build_device_space + rd_release_device_spaceurl:https://github.com/torvalds/linux/commit/4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc

Trust: 0.8

title:[PATCH] target: Explicitly clear ramdisk_mcp backend pagesurl:http://permalink.gmane.org/gmane.linux.scsi.target.devel/6618

Trust: 0.8

title:Linux Kernel Archivesurl:http://www.kernel.org

Trust: 0.8

title:target/rd: Refactor rd_build_device_space + rd_release_device_spaceurl:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc

Trust: 0.8

title:Bug 1108744url:https://bugzilla.redhat.com/show_bug.cgi?id=1108744

Trust: 0.8

title:sol15685: Linux kernel vulnerabilities CVE-2014-3940 and CVE-2014-4027url:https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15685.html

Trust: 0.8

sources: JVNDB: JVNDB-2014-003017

EXTERNAL IDS

db:NVDid:CVE-2014-4027

Trust: 3.4

db:OPENWALLid:OSS-SECURITY/2014/06/11/1

Trust: 1.7

db:SECUNIAid:60564

Trust: 1.1

db:SECUNIAid:59777

Trust: 1.1

db:SECUNIAid:61310

Trust: 1.1

db:SECUNIAid:59134

Trust: 1.1

db:JVNDBid:JVNDB-2014-003017

Trust: 0.8

db:CNNVDid:CNNVD-201406-527

Trust: 0.7

db:BIDid:68159

Trust: 0.4

db:VULHUBid:VHN-71967

Trust: 0.1

db:PACKETSTORMid:128090

Trust: 0.1

db:PACKETSTORMid:127788

Trust: 0.1

db:PACKETSTORMid:128089

Trust: 0.1

db:PACKETSTORMid:127515

Trust: 0.1

db:PACKETSTORMid:128088

Trust: 0.1

db:PACKETSTORMid:128091

Trust: 0.1

sources: VULHUB: VHN-71967 // BID: 68159 // JVNDB: JVNDB-2014-003017 // PACKETSTORM: 128090 // PACKETSTORM: 127788 // PACKETSTORM: 128089 // PACKETSTORM: 127515 // PACKETSTORM: 128088 // PACKETSTORM: 128091 // CNNVD: CNNVD-201406-527 // NVD: CVE-2014-4027

REFERENCES

url:https://bugzilla.redhat.com/show_bug.cgi?id=1108744

Trust: 1.7

url:https://github.com/torvalds/linux/commit/4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2014/06/11/1

Trust: 1.7

url:http://permalink.gmane.org/gmane.linux.scsi.target.devel/6618

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-2334-1

Trust: 1.2

url:http://www.ubuntu.com/usn/usn-2335-1

Trust: 1.2

url:https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15685.html

Trust: 1.1

url:http://secunia.com/advisories/59134

Trust: 1.1

url:http://secunia.com/advisories/59777

Trust: 1.1

url:http://secunia.com/advisories/60564

Trust: 1.1

url:http://secunia.com/advisories/61310

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html

Trust: 1.1

url:http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3ba=commit%3bh=4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4027

Trust: 0.9

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-4027

Trust: 0.8

url:http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2014-4027

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2014-4655

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2014-4656

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2014-4652

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2014-4654

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2014-4653

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2014-4667

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2014-4171

Trust: 0.4

url:http://www.kernel.org/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-4014

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-4508

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-3917

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-0206

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-0181

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-5045

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-0155

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-4608

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-0131

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-4943

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-5077

Trust: 0.2

url:http://www.ubuntu.com/usn/usn-2336-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-lts-trusty/3.13.0-35.62~precise1

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4514

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4943

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4655

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4653

Trust: 0.1

url:http://www.mandriva.com/en/support/security/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-4514

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4654

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4608

Trust: 0.1

url:http://www.mandriva.com/en/support/security/advisories/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4699

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4652

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4699

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0131

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4656

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4667

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-ti-omap4/3.2.0-1452.72

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1739

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-lts-quantal/3.5.0-54.81~precise1

Trust: 0.1

url:http://www.ubuntu.com/usn/usn-2285-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/3.2.0-68.102

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/3.13.0-35.62

Trust: 0.1

url:http://www.ubuntu.com/usn/usn-2337-1

Trust: 0.1

sources: VULHUB: VHN-71967 // BID: 68159 // JVNDB: JVNDB-2014-003017 // PACKETSTORM: 128090 // PACKETSTORM: 127788 // PACKETSTORM: 128089 // PACKETSTORM: 127515 // PACKETSTORM: 128088 // PACKETSTORM: 128091 // CNNVD: CNNVD-201406-527 // NVD: CVE-2014-4027

CREDITS

Ubuntu

Trust: 0.5

sources: PACKETSTORM: 128090 // PACKETSTORM: 128089 // PACKETSTORM: 127515 // PACKETSTORM: 128088 // PACKETSTORM: 128091

SOURCES

db:VULHUBid:VHN-71967
db:BIDid:68159
db:JVNDBid:JVNDB-2014-003017
db:PACKETSTORMid:128090
db:PACKETSTORMid:127788
db:PACKETSTORMid:128089
db:PACKETSTORMid:127515
db:PACKETSTORMid:128088
db:PACKETSTORMid:128091
db:CNNVDid:CNNVD-201406-527
db:NVDid:CVE-2014-4027

LAST UPDATE DATE

2025-01-10T21:58:47.370000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-71967date:2020-08-21T00:00:00
db:BIDid:68159date:2014-12-12T00:54:00
db:JVNDBid:JVNDB-2014-003017date:2014-11-26T00:00:00
db:CNNVDid:CNNVD-201406-527date:2014-06-24T00:00:00
db:NVDid:CVE-2014-4027date:2024-11-21T02:09:21.917

SOURCES RELEASE DATE

db:VULHUBid:VHN-71967date:2014-06-23T00:00:00
db:BIDid:68159date:2014-01-07T00:00:00
db:JVNDBid:JVNDB-2014-003017date:2014-06-24T00:00:00
db:PACKETSTORMid:128090date:2014-09-02T20:21:38
db:PACKETSTORMid:127788date:2014-08-08T21:42:49
db:PACKETSTORMid:128089date:2014-09-02T20:21:27
db:PACKETSTORMid:127515date:2014-07-17T21:46:58
db:PACKETSTORMid:128088date:2014-09-02T20:21:08
db:PACKETSTORMid:128091date:2014-09-02T20:21:47
db:CNNVDid:CNNVD-201406-527date:2014-06-24T00:00:00
db:NVDid:CVE-2014-4027date:2014-06-23T11:21:18.700