SCIENTIFIC-LINUX-ERRATA Archives

December 2014

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Thu, 18 Dec 2014 15:28:00 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (39 lines)
Synopsis:          Important: kernel security update
Advisory ID:       SLSA-2014:2010-1
Issue Date:        2014-12-18
CVE Numbers:       CVE-2014-9322
--

* A flaw was found in the way the Linux kernel handled GS segment register
base switching when recovering from a #SS (stack segment) fault on an
erroneous return to user space. A local, unprivileged user could use this
flaw to escalate their privileges on the system. (CVE-2014-9322,
Important)

The system must be rebooted for this update to take effect.
--

SL7
  x86_64
    kernel-3.10.0-123.13.2.el7.x86_64.rpm
    kernel-debug-3.10.0-123.13.2.el7.x86_64.rpm
    kernel-debug-debuginfo-3.10.0-123.13.2.el7.x86_64.rpm
    kernel-debug-devel-3.10.0-123.13.2.el7.x86_64.rpm
    kernel-debuginfo-3.10.0-123.13.2.el7.x86_64.rpm
    kernel-debuginfo-common-x86_64-3.10.0-123.13.2.el7.x86_64.rpm
    kernel-devel-3.10.0-123.13.2.el7.x86_64.rpm
    kernel-headers-3.10.0-123.13.2.el7.x86_64.rpm
    kernel-tools-3.10.0-123.13.2.el7.x86_64.rpm
    kernel-tools-debuginfo-3.10.0-123.13.2.el7.x86_64.rpm
    kernel-tools-libs-3.10.0-123.13.2.el7.x86_64.rpm
    perf-3.10.0-123.13.2.el7.x86_64.rpm
    perf-debuginfo-3.10.0-123.13.2.el7.x86_64.rpm
    python-perf-debuginfo-3.10.0-123.13.2.el7.x86_64.rpm
    kernel-tools-libs-devel-3.10.0-123.13.2.el7.x86_64.rpm
    python-perf-3.10.0-123.13.2.el7.x86_64.rpm
  noarch
    kernel-abi-whitelists-3.10.0-123.13.2.el7.noarch.rpm
    kernel-doc-3.10.0-123.13.2.el7.noarch.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2