SCIENTIFIC-LINUX-ERRATA Archives

March 2015

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Wed, 25 Mar 2015 15:19:59 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (103 lines)
Synopsis:          Important: kernel security, bug fix, and enhancement update
Advisory ID:       SLSA-2015:0290-1
Issue Date:        2015-03-05
CVE Numbers:       CVE-2014-3940
                   CVE-2014-7825
                   CVE-2014-7826
                   CVE-2014-8160
                   CVE-2014-8086
                   CVE-2014-3690
                   CVE-2014-8884
                   CVE-2014-8709
                   CVE-2015-0274
                   CVE-2014-8173
                   CVE-2014-8172
--

* A flaw was found in the way the Linux kernel's XFS file system handled
replacing of remote attributes under certain conditions. A local user with
access to XFS file system mount could potentially use this flaw to
escalate their privileges on the system. (CVE-2015-0274, Important)

* It was found that the Linux kernel's KVM implementation did not ensure
that the host CR4 control register value remained unchanged across VM
entries on the same virtual CPU. A local, unprivileged user could use this
flaw to cause denial of service on the system. (CVE-2014-3690, Moderate)

* A flaw was found in the way Linux kernel's Transparent Huge Pages (THP)
implementation handled non-huge page migration. A local, unprivileged user
could use this flaw to crash the kernel by migrating transparent
hugepages. (CVE-2014-3940, Moderate)

* An out-of-bounds memory access flaw was found in the syscall tracing
functionality of the Linux kernel's perf subsystem. A local, unprivileged
user could use this flaw to crash the system. (CVE-2014-7825, Moderate)

* An out-of-bounds memory access flaw was found in the syscall tracing
functionality of the Linux kernel's ftrace subsystem. On a system with
ftrace syscall tracing enabled, a local, unprivileged user could use this
flaw to crash the system, or escalate their privileges. (CVE-2014-7826,
Moderate)

* A race condition flaw was found in the Linux kernel's ext4 file system
implementation that allowed a local, unprivileged user to crash the system
by simultaneously writing to a file and toggling the O_DIRECT flag using
fcntl(F_SETFL) on that file. (CVE-2014-8086, Moderate)

* A flaw was found in the way the Linux kernel's netfilter subsystem
handled generic protocol tracking. As demonstrated in the Stream Control
Transmission Protocol (SCTP) case, a remote attacker could use this flaw
to bypass intended iptables rule restrictions when the associated
connection tracking module was not loaded on the system. (CVE-2014-8160,
Moderate)

* It was found that due to excessive files_lock locking, a soft lockup
could be triggered in the Linux kernel when performing asynchronous I/O
operations. A local, unprivileged user could use this flaw to crash the
system. (CVE-2014-8172, Moderate)

* A NULL pointer dereference flaw was found in the way the Linux kernel's
madvise MADV_WILLNEED functionality handled page table locking. A local,
unprivileged user could use this flaw to crash the system. (CVE-2014-8173,
Moderate)

* An information leak flaw was found in the Linux kernel's IEEE 802.11
wireless networking implementation. When software encryption was used, a
remote attacker could use this flaw to leak up to 8 bytes of plaintext.
(CVE-2014-8709, Low)

* A stack-based buffer overflow flaw was found in the
TechnoTrend/Hauppauge DEC USB device driver. A local user with write
access to the corresponding device could use this flaw to crash the kernel
or, potentially, elevate their privileges on the system. (CVE-2014-8884,
Low)

* Users of kernel modules may need to upgrade the module to maintain compatibility.

The system must be rebooted for this update to take effect.
--

SL7
  x86_64
    kernel-3.10.0-229.el7.x86_64.rpm
    kernel-debug-3.10.0-229.el7.x86_64.rpm
    kernel-debug-debuginfo-3.10.0-229.el7.x86_64.rpm
    kernel-debug-devel-3.10.0-229.el7.x86_64.rpm
    kernel-debuginfo-3.10.0-229.el7.x86_64.rpm
    kernel-debuginfo-common-x86_64-3.10.0-229.el7.x86_64.rpm
    kernel-devel-3.10.0-229.el7.x86_64.rpm
    kernel-headers-3.10.0-229.el7.x86_64.rpm
    kernel-tools-3.10.0-229.el7.x86_64.rpm
    kernel-tools-debuginfo-3.10.0-229.el7.x86_64.rpm
    kernel-tools-libs-3.10.0-229.el7.x86_64.rpm
    perf-3.10.0-229.el7.x86_64.rpm
    perf-debuginfo-3.10.0-229.el7.x86_64.rpm
    python-perf-debuginfo-3.10.0-229.el7.x86_64.rpm
    kernel-tools-libs-devel-3.10.0-229.el7.x86_64.rpm
    python-perf-3.10.0-229.el7.x86_64.rpm
  noarch
    kernel-abi-whitelists-3.10.0-229.el7.noarch.rpm
    kernel-doc-3.10.0-229.el7.noarch.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2