SCIENTIFIC-LINUX-ERRATA Archives

March 2014

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Tue, 25 Mar 2014 21:07:58 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (70 lines)
Synopsis:          Important: kernel security and bug fix update
Advisory ID:       SLSA-2014:0328-1
Issue Date:        2014-03-25
CVE Numbers:       CVE-2013-1860
                   CVE-2014-0055
                   CVE-2014-0069
                   CVE-2014-0101
--

* A flaw was found in the way the get_rx_bufs() function in the vhost_net
implementation in the Linux kernel handled error conditions reported by
the vhost_get_vq_desc() function. A privileged guest user could use this
flaw to crash the host. (CVE-2014-0055, Important)

* A flaw was found in the way the Linux kernel processed an authenticated
COOKIE_ECHO chunk during the initialization of an SCTP connection. A
remote attacker could use this flaw to crash the system by initiating a
specially crafted SCTP handshake in order to trigger a NULL pointer
dereference on the system. (CVE-2014-0101, Important)

* A flaw was found in the way the Linux kernel's CIFS implementation
handled uncached write operations with specially crafted iovec structures.
An unprivileged local user with access to a CIFS share could use this flaw
to crash the system, leak kernel memory, or, potentially, escalate their
privileges on the system. Note: the default cache settings for CIFS mounts
on Scientific Linux 6 prohibit a successful exploitation of this issue.
(CVE-2014-0069, Moderate)

* A heap-based buffer overflow flaw was found in the Linux kernel's cdc-
wdm driver, used for USB CDC WCM device management. An attacker with
physical access to a system could use this flaw to cause a denial of
service or, potentially, escalate their privileges. (CVE-2013-1860, Low)

The system must be rebooted for this update to take effect.
--

SL6
  x86_64
    kernel-2.6.32-431.11.2.el6.x86_64.rpm
    kernel-debug-2.6.32-431.11.2.el6.x86_64.rpm
    kernel-debug-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm
    kernel-debug-devel-2.6.32-431.11.2.el6.x86_64.rpm
    kernel-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm
    kernel-debuginfo-common-x86_64-2.6.32-431.11.2.el6.x86_64.rpm
    kernel-devel-2.6.32-431.11.2.el6.x86_64.rpm
    kernel-headers-2.6.32-431.11.2.el6.x86_64.rpm
    perf-2.6.32-431.11.2.el6.x86_64.rpm
    perf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm
    python-perf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm
    python-perf-2.6.32-431.11.2.el6.x86_64.rpm
  i386
    kernel-2.6.32-431.11.2.el6.i686.rpm
    kernel-debug-2.6.32-431.11.2.el6.i686.rpm
    kernel-debug-debuginfo-2.6.32-431.11.2.el6.i686.rpm
    kernel-debug-devel-2.6.32-431.11.2.el6.i686.rpm
    kernel-debuginfo-2.6.32-431.11.2.el6.i686.rpm
    kernel-debuginfo-common-i686-2.6.32-431.11.2.el6.i686.rpm
    kernel-devel-2.6.32-431.11.2.el6.i686.rpm
    kernel-headers-2.6.32-431.11.2.el6.i686.rpm
    perf-2.6.32-431.11.2.el6.i686.rpm
    perf-debuginfo-2.6.32-431.11.2.el6.i686.rpm
    python-perf-debuginfo-2.6.32-431.11.2.el6.i686.rpm
    python-perf-2.6.32-431.11.2.el6.i686.rpm
  noarch
    kernel-abi-whitelists-2.6.32-431.11.2.el6.noarch.rpm
    kernel-doc-2.6.32-431.11.2.el6.noarch.rpm
    kernel-firmware-2.6.32-431.11.2.el6.noarch.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2