summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2014-9888
diff options
context:
space:
mode:
authorBen Hutchings <benh@debian.org>2017-02-23 21:55:28 +0000
committerBen Hutchings <benh@debian.org>2017-02-23 21:55:28 +0000
commitc77a05b32b2f63a5cefb610c25affbe3a5afe807 (patch)
tree83c44ec760bac31786ce6385a318fbf76a8d8e81 /retired/CVE-2014-9888
parent8006483d9aab4dfb5da87b728df3166107707e9e (diff)
Retire many issues now released (or N/A or ignored) in all branches
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@5001 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2014-9888')
-rw-r--r--retired/CVE-2014-988813
1 files changed, 13 insertions, 0 deletions
diff --git a/retired/CVE-2014-9888 b/retired/CVE-2014-9888
new file mode 100644
index 00000000..38027afd
--- /dev/null
+++ b/retired/CVE-2014-9888
@@ -0,0 +1,13 @@
+Description: arch/arm/mm/dma-mapping.c in the Linux kernel before 3.13 on ARM platforms, as used in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices, does not prevent executable DMA mappings, which might allow local users to gain privileges via a crafted application, aka Android internal bug 28803642 and Qualcomm internal bug CR642735.
+References:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9888
+ http://source.android.com/security/bulletin/2016-08-01.html
+ https://source.codeaurora.org/quic/la/kernel/msm/commit/?id=f044936caab337a4384fbfe64a4cbae33c7e22a1
+Notes:
+Bugs:
+upstream: released (3.13-rc1) [0ea1ec713f04bdfac343c9702b21cd3a7c711826]
+3.16-upstream-stable: N/A
+3.2-upstream-stable: released (3.2.85) [arm-dma-mapping-don-t-allow-dma-mappings-to-be-marked-executable.patch]
+sid: released (3.13.4-1)
+3.16-jessie-security: N/A
+3.2-wheezy-security: released (3.2.84-2) [bugfix/arm/arm-dma-mapping-don-t-allow-dma-mappings-to-be-marked-executable.patch]

© 2014-2024 Faster IT GmbH | imprint | privacy policy