SCIENTIFIC-LINUX-ERRATA Archives

July 2014

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Thu, 24 Jul 2014 13:52:06 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (59 lines)
Synopsis:          Important: kernel security update
Advisory ID:       SLSA-2014:0924-1
Issue Date:        2014-07-23
CVE Numbers:       CVE-2014-4699
                   CVE-2014-4943
--

* It was found that the Linux kernel's ptrace subsystem allowed a traced
process' instruction pointer to be set to a non-canonical memory address
without forcing the non-sysret code path when returning to user space. A
local, unprivileged user could use this flaw to crash the system or,
potentially, escalate their privileges on the system. (CVE-2014-4699,
Important)

Note: The CVE-2014-4699 issue only affected systems using an Intel CPU.

* A flaw was found in the way the pppol2tp_setsockopt() and
pppol2tp_getsockopt() functions in the Linux kernel's PPP over L2TP
implementation handled requests with a non-SOL_PPPOL2TP socket option
level. A local, unprivileged user could use this flaw to escalate their
privileges on the system. (CVE-2014-4943, Important)

The system must be rebooted for this update to take effect.
--

SL6
  x86_64
    kernel-2.6.32-431.20.5.el6.x86_64.rpm
    kernel-debug-2.6.32-431.20.5.el6.x86_64.rpm
    kernel-debug-debuginfo-2.6.32-431.20.5.el6.x86_64.rpm
    kernel-debug-devel-2.6.32-431.20.5.el6.x86_64.rpm
    kernel-debuginfo-2.6.32-431.20.5.el6.x86_64.rpm
    kernel-debuginfo-common-x86_64-2.6.32-431.20.5.el6.x86_64.rpm
    kernel-devel-2.6.32-431.20.5.el6.x86_64.rpm
    kernel-headers-2.6.32-431.20.5.el6.x86_64.rpm
    perf-2.6.32-431.20.5.el6.x86_64.rpm
    perf-debuginfo-2.6.32-431.20.5.el6.x86_64.rpm
    python-perf-debuginfo-2.6.32-431.20.5.el6.x86_64.rpm
    python-perf-2.6.32-431.20.5.el6.x86_64.rpm
  i386
    kernel-2.6.32-431.20.5.el6.i686.rpm
    kernel-debug-2.6.32-431.20.5.el6.i686.rpm
    kernel-debug-debuginfo-2.6.32-431.20.5.el6.i686.rpm
    kernel-debug-devel-2.6.32-431.20.5.el6.i686.rpm
    kernel-debuginfo-2.6.32-431.20.5.el6.i686.rpm
    kernel-debuginfo-common-i686-2.6.32-431.20.5.el6.i686.rpm
    kernel-devel-2.6.32-431.20.5.el6.i686.rpm
    kernel-headers-2.6.32-431.20.5.el6.i686.rpm
    perf-2.6.32-431.20.5.el6.i686.rpm
    perf-debuginfo-2.6.32-431.20.5.el6.i686.rpm
    python-perf-debuginfo-2.6.32-431.20.5.el6.i686.rpm
    python-perf-2.6.32-431.20.5.el6.i686.rpm
  noarch
    kernel-abi-whitelists-2.6.32-431.20.5.el6.noarch.rpm
    kernel-doc-2.6.32-431.20.5.el6.noarch.rpm
    kernel-firmware-2.6.32-431.20.5.el6.noarch.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2