SCIENTIFIC-LINUX-ERRATA Archives

January 2015

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Wed, 28 Jan 2015 22:54:49 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (88 lines)
Synopsis:          Important: kernel security and bug fix update
Advisory ID:       SLSA-2015:0102-1
Issue Date:        2015-01-28
CVE Numbers:       CVE-2014-4171
                   CVE-2014-5471
                   CVE-2014-5472
                   CVE-2014-7841
                   CVE-2014-7145
                   CVE-2014-7822
--

* A flaw was found in the way the Linux kernel's SCTP implementation
validated INIT chunks when performing Address Configuration Change
(ASCONF). A remote attacker could use this flaw to crash the system by
sending a specially crafted SCTP packet to trigger a NULL pointer
dereference on the system. (CVE-2014-7841, Important)

* A race condition flaw was found in the way the Linux kernel's mmap(2),
madvise(2), and fallocate(2) system calls interacted with each other while
operating on virtual memory file system files. A local user could use this
flaw to cause a denial of service. (CVE-2014-4171, Moderate)

* A NULL pointer dereference flaw was found in the way the Linux kernel's
Common Internet File System (CIFS) implementation handled mounting of file
system shares. A remote attacker could use this flaw to crash a client
system that would mount a file system share from a malicious server.
(CVE-2014-7145, Moderate)

* A flaw was found in the way the Linux kernel's splice() system call
validated its parameters. On certain file systems, a local, unprivileged
user could use this flaw to write past the maximum file size, and thus
crash the system. (CVE-2014-7822, Moderate)

* It was found that the parse_rock_ridge_inode_internal() function of the
Linux kernel's ISOFS implementation did not correctly check relocated
directories when processing Rock Ridge child link (CL) tags. An attacker
with physical access to the system could use a specially crafted ISO image
to crash the system or, potentially, escalate their privileges on the
system. (CVE-2014-5471, CVE-2014-5472, Low)

This update also fixes the following bugs:

* Previously, a kernel panic could occur if a process reading from a
locked NFS file was killed and the lock was not released properly before
the read operations finished. Consequently, the system crashed. The code
handling file locks has been fixed, and instead of halting, the system now
emits a warning about the unreleased lock.

* A race condition in the command abort handling logic of the ipr device
driver could cause the kernel to panic when the driver received a response
to an abort command prior to receiving other responses to the aborted
command due to the support for multiple interrupts. With this update, the
abort handler waits for the aborted command's responses first before
completing an abort operation.

* Previously, a race condition could occur when changing a Page Table
Entry (PTE) or a Page Middle Directory (PMD) to "pte_numa" or "pmd_numa",
respectively, causing the kernel to crash. This update removes the
BUG_ON() macro from the __handle_mm_fault() function, preventing the
kernel panic in the aforementioned scenario.

The system must be rebooted for this update to take effect.
--

SL7
  x86_64
    kernel-3.10.0-123.20.1.el7.x86_64.rpm
    kernel-debug-3.10.0-123.20.1.el7.x86_64.rpm
    kernel-debug-debuginfo-3.10.0-123.20.1.el7.x86_64.rpm
    kernel-debug-devel-3.10.0-123.20.1.el7.x86_64.rpm
    kernel-debuginfo-3.10.0-123.20.1.el7.x86_64.rpm
    kernel-debuginfo-common-x86_64-3.10.0-123.20.1.el7.x86_64.rpm
    kernel-devel-3.10.0-123.20.1.el7.x86_64.rpm
    kernel-headers-3.10.0-123.20.1.el7.x86_64.rpm
    kernel-tools-3.10.0-123.20.1.el7.x86_64.rpm
    kernel-tools-debuginfo-3.10.0-123.20.1.el7.x86_64.rpm
    kernel-tools-libs-3.10.0-123.20.1.el7.x86_64.rpm
    perf-3.10.0-123.20.1.el7.x86_64.rpm
    perf-debuginfo-3.10.0-123.20.1.el7.x86_64.rpm
    python-perf-debuginfo-3.10.0-123.20.1.el7.x86_64.rpm
    kernel-tools-libs-devel-3.10.0-123.20.1.el7.x86_64.rpm
    python-perf-3.10.0-123.20.1.el7.x86_64.rpm
  noarch
    kernel-abi-whitelists-3.10.0-123.20.1.el7.noarch.rpm
    kernel-doc-3.10.0-123.20.1.el7.noarch.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2