First published: Fri Dec 12 2014(Updated: )
An information leak in the Linux kernel was discovered that could leak the high 16 bits of the kernel stack address on 32-bit Kernel Virtual Machine (KVM) paravirt guests. A user in the guest OS could exploit this leak to obtain information that could potentially be used to aid in attacking the kernel. (CVE-2014-8134) A flaw in the handling of malformed ASCONF chunks by SCTP (Stream Control Transmission Protocol) implementation in the Linux kernel was discovered. A remote attacker could exploit this flaw to cause a denial of service (system crash). (CVE-2014-3673) A flaw in the handling of duplicate ASCONF chunks by SCTP (Stream Control Transmission Protocol) implementation in the Linux kernel was discovered. A remote attacker could exploit this flaw to cause a denial of service (panic). (CVE-2014-3687) It was discovered that excessive queuing by SCTP (Stream Control Transmission Protocol) implementation in the Linux kernel can cause memory pressure. A remote attacker could exploit this flaw to cause a denial of service. (CVE-2014-3688) A null pointer dereference flaw was discovered in the the Linux kernel's SCTP implementation when ASCONF is used. A remote attacker could exploit this flaw to cause a denial of service (system crash) via a malformed INIT chunk. (CVE-2014-7841) Jouni Malinen reported a flaw in the handling of fragmentation in the mac8Linux subsystem of the kernel. A remote attacker could exploit this flaw to obtain potential sensitive cleartext information by reading packets. (CVE-2014-8709) A stack buffer overflow was discovered in the ioctl command handling for the Technotrend/Hauppauge USB DEC devices driver. A local user could exploit this flaw to cause a denial of service (system crash) or possibly gain privileges. (CVE-2014-8884) Andy Lutomirski discovered that the Linux kernel does not properly handle faults associated with the Stack Segment (SS) register on the x86 architecture. A local attacker could exploit this flaw to cause a denial of service (panic). (CVE-2014-9090)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-2.6.32-70-generic-pae | <2.6.32-70.137 | 2.6.32-70.137 |
=10.04 | ||
All of | ||
ubuntu/linux-image-2.6.32-70-virtual | <2.6.32-70.137 | 2.6.32-70.137 |
=10.04 | ||
All of | ||
ubuntu/linux-image-2.6.32-70-lpia | <2.6.32-70.137 | 2.6.32-70.137 |
=10.04 | ||
All of | ||
ubuntu/linux-image-2.6.32-70-sparc64 | <2.6.32-70.137 | 2.6.32-70.137 |
=10.04 | ||
All of | ||
ubuntu/linux-image-2.6.32-70-server | <2.6.32-70.137 | 2.6.32-70.137 |
=10.04 | ||
All of | ||
ubuntu/linux-image-2.6.32-70-powerpc-smp | <2.6.32-70.137 | 2.6.32-70.137 |
=10.04 | ||
All of | ||
ubuntu/linux-image-2.6.32-70-versatile | <2.6.32-70.137 | 2.6.32-70.137 |
=10.04 | ||
All of | ||
ubuntu/linux-image-2.6.32-70-powerpc64-smp | <2.6.32-70.137 | 2.6.32-70.137 |
=10.04 | ||
All of | ||
ubuntu/linux-image-2.6.32-70-386 | <2.6.32-70.137 | 2.6.32-70.137 |
=10.04 | ||
All of | ||
ubuntu/linux-image-2.6.32-70-generic | <2.6.32-70.137 | 2.6.32-70.137 |
=10.04 | ||
All of | ||
ubuntu/linux-image-2.6.32-70-powerpc | <2.6.32-70.137 | 2.6.32-70.137 |
=10.04 | ||
All of | ||
ubuntu/linux-image-2.6.32-70-sparc64-smp | <2.6.32-70.137 | 2.6.32-70.137 |
=10.04 | ||
All of | ||
ubuntu/linux-image-2.6.32-70-preempt | <2.6.32-70.137 | 2.6.32-70.137 |
=10.04 | ||
All of | ||
ubuntu/linux-image-2.6.32-70-ia64 | <2.6.32-70.137 | 2.6.32-70.137 |
=10.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)