[kernel-sec-discuss] r4913 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Tue Feb 14 14:59:37 UTC 2017


Author: jmm
Date: 2017-02-14 14:59:37 +0000 (Tue, 14 Feb 2017)
New Revision: 4913

Added:
   active/CVE-2014-9888
Log:
new arm issue


Added: active/CVE-2014-9888
===================================================================
--- active/CVE-2014-9888	                        (rev 0)
+++ active/CVE-2014-9888	2017-02-14 14:59:37 UTC (rev 4913)
@@ -0,0 +1,13 @@
+Description: arch/arm/mm/dma-mapping.c in the Linux kernel before 3.13 on ARM platforms, as used in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices, does not prevent executable DMA mappings, which might allow local users to gain privileges via a crafted application, aka Android internal bug 28803642 and Qualcomm internal bug CR642735. 
+References:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9888
+ http://source.android.com/security/bulletin/2016-08-01.html
+ https://source.codeaurora.org/quic/la/kernel/msm/commit/?id=f044936caab337a4384fbfe64a4cbae33c7e22a1 
+Notes:
+Bugs:
+upstream: released (3.13-rc1) [0ea1ec713f04bdfac343c9702b21cd3a7c711826]
+3.16-upstream-stable: N/A
+3.2-upstream-stable:
+sid: released (3.13.4-1)
+3.16-jessie-security: N/A
+3.2-wheezy-security:




More information about the kernel-sec-discuss mailing list